An Access Control Language Based on Term Rewriting and Description Logic

Author(s):  
Michele Baggi ◽  
Demis Ballis ◽  
Moreno Falaschi
2008 ◽  
pp. 2865-2891
Author(s):  
Sarath Indrakanti ◽  
Vijay Varadharajan ◽  
Michael Hitchens

In this paper, we discuss the design issues for an authorization framework for Web Services. In particular, we describe the features required for an authorization policy language for Web Services. We briefly introduce the authorization service provided by Microsoft .NET MyServices and describe our extended authorization model that proposes extensions to the .NET MyServices authorization service to support a range of authorization policies required in commercial systems. We discuss the application of the extended authorization model to a health care system built using Web Services. We use the XML Access Control Language (XACL) in our implementation to demonstrate our extended authorization model. This also enables us to evaluate the range of authorization policies that XACL supports.


2021 ◽  
Vol 15 (2) ◽  
pp. 87-112
Author(s):  
Randhir Kumar ◽  
Rakesh Tripathi

Provenance provides information about how data came to be in its present state. Recently, many critical applications are working with data provenance and provenance security. However, the main challenges in provenance-based applications are storage representation, provenance security, and centralized approach. In this paper, the authors propose a secure trading framework which is based on the techniques of blockchain that includes various features like decentralization, immutability, and integrity in order to solve the trust crisis in centralized provenance-based system. To overcome the storage representation of data provenance, they propose JavaScript object notation (JSON) structure. To improve the provenance security, they propose the access control language (ACL) rule. To implement the JSON structure and ACL rules, permissioned blockchain based tool “Hyperledger Composer” has been used. They demonstrate that their framework minimizes the execution time when the number of transaction increases in terms of storage representation of data provenance and security.


Sign in / Sign up

Export Citation Format

Share Document