+

Dai et al., 2005 - Google Patents

UDDI access control

Dai et al., 2005

View PDF
Document ID
12148499636674378035
Author
Dai J
Steele R
Publication year
Publication venue
Third International Conference on Information Technology and Applications (ICITA'05)

External Links

Snippet

Web services are designed to provide easier B2B integration among enterprises. UDDI defines a standard way for businesses to list their services and discover each other on the Internet. Due to security concerns organizations prefer to build their own private UDDI …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/104Grouping of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/102Entity profiles

Similar Documents

Publication Publication Date Title
Karjoth Access control with IBM Tivoli access manager
Lorch et al. First experiences using XACML for access control in distributed systems
US10911428B1 (en) Use of metadata for computing resource access
Yuan et al. Attributed based access control (ABAC) for web services
US7478157B2 (en) System, method, and business methods for enforcing privacy preferences on personal-data exchanges across a network
US7685206B1 (en) Authorization and access control service for distributed network resources
US9916461B2 (en) Identity context-based access control
US11102189B2 (en) Techniques for delegation of access privileges
US7478407B2 (en) Supporting multiple application program interfaces
US20040073668A1 (en) Policy delegation for access control
US9473499B2 (en) Federated role provisioning
US20040059946A1 (en) Network server system and method for securely publishing applications and services
Karjoth et al. Implementing ACL-based policies in XACML
Dai et al. UDDI access control
Schläger et al. Attribute-based authentication and authorisation infrastructures for e-commerce providers
Marillonnet et al. An Efficient User‐Centric Consent Management Design for Multiservices Platforms
Hebig et al. A web service architecture for decentralised identity-and attribute-based access control
Ardagna et al. XML security
Indrakanti et al. Authorization service for web services and its application in a health care domain
Kounga et al. Extending XACML access control architecture for allowing preference-based authorisation
Jo Secure access policy for efficient resource in mobile computing environment
Marillonnet et al. Research Article An Efficient User-Centric Consent Management Design for Multiservices Platforms
Steele et al. UDDI Access control for extended enterprise
Alhammouri et al. A design of an access control model for multilevel-security documents
Encheva et al. Sharing Protected Web Resources
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载