Dai et al., 2005 - Google Patents
UDDI access controlDai et al., 2005
View PDF- Document ID
- 12148499636674378035
- Author
- Dai J
- Steele R
- Publication year
- Publication venue
- Third International Conference on Information Technology and Applications (ICITA'05)
External Links
Snippet
Web services are designed to provide easier B2B integration among enterprises. UDDI defines a standard way for businesses to list their services and discover each other on the Internet. Due to security concerns organizations prefer to build their own private UDDI …
- 239000000344 soap 0 description 5
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/102—Entity profiles
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Karjoth | Access control with IBM Tivoli access manager | |
Lorch et al. | First experiences using XACML for access control in distributed systems | |
US10911428B1 (en) | Use of metadata for computing resource access | |
Yuan et al. | Attributed based access control (ABAC) for web services | |
US7478157B2 (en) | System, method, and business methods for enforcing privacy preferences on personal-data exchanges across a network | |
US7685206B1 (en) | Authorization and access control service for distributed network resources | |
US9916461B2 (en) | Identity context-based access control | |
US11102189B2 (en) | Techniques for delegation of access privileges | |
US7478407B2 (en) | Supporting multiple application program interfaces | |
US20040073668A1 (en) | Policy delegation for access control | |
US9473499B2 (en) | Federated role provisioning | |
US20040059946A1 (en) | Network server system and method for securely publishing applications and services | |
Karjoth et al. | Implementing ACL-based policies in XACML | |
Dai et al. | UDDI access control | |
Schläger et al. | Attribute-based authentication and authorisation infrastructures for e-commerce providers | |
Marillonnet et al. | An Efficient User‐Centric Consent Management Design for Multiservices Platforms | |
Hebig et al. | A web service architecture for decentralised identity-and attribute-based access control | |
Ardagna et al. | XML security | |
Indrakanti et al. | Authorization service for web services and its application in a health care domain | |
Kounga et al. | Extending XACML access control architecture for allowing preference-based authorisation | |
Jo | Secure access policy for efficient resource in mobile computing environment | |
Marillonnet et al. | Research Article An Efficient User-Centric Consent Management Design for Multiservices Platforms | |
Steele et al. | UDDI Access control for extended enterprise | |
Alhammouri et al. | A design of an access control model for multilevel-security documents | |
Encheva et al. | Sharing Protected Web Resources |