نتایج جستجو برای: xacml
تعداد نتایج: 771 فیلتر نتایج به سال:
Social Networks, as the main axis of Web 2.0, are creating a number of interesting challenges to the research and standardisation communities. In this paper, we analyse the current and future use of access control policies in Social Networks. Subsequently, two main issues are addressed: the interoperability amongst systems using different policy languages and the lack of elements in the existin...
Existing registry technologies such as UDDI can be enhanced to support capabilities for semantic reasoning and inquiry, which subsequently increases its usability range. The Grimoires registry was developed to provide such support through the use of metadata attachments to registry entities. The use of such attachments provides a way for allowing service operators to specify security assertions...
Current Grid Security Infrastructure using PKI based on SSO. Trust is hard to establish in a service-oriented grid architecture because of the need to support end user SSO and dynamic transient service. Open Grid Service (OGS) Security Infrastructure in Global Grid Forum will extend use of Grid system or services up to business area using XML Web Service security technology. This paper describe...
Recently research is focused on security policy integration and conflict reconciliation among various healthcare organizations. Problem statement: However, challenging security and privacy risk issues still arisen during sharing sensitive patient data in different large distributed organizations. Though eXtensible Access Control Markup Language (XACML) has a powerful capacity of expression, it ...
This is the second part, after [1], of the research devoted to analysis of 1ports composed of similar conductors (“f-circuits”) described by the characteristic i = f(v) of a polynomial type. This analysis is performed by means of the power-law “αcircuits” introduced in [2], for which f(v) ~ v α . The f-circuits are constructed from the α-circuits of the same topology, with the proper α, so that...
The popularity of REST grows more and more and so does the need for fine-grained access control for RESTful services. Attribute Based Access Control (ABAC) is a very generic concept that covers multiple different access control mechanism. XACML is an implementation of ABAC based on XML and is established as a standard mechanism. Its flexibility opens the opportunity to specify detailed security...
The connectivity of devices, machines and people via Cloud infrastructure can support collaborations among doctors and specialists from different medical organisations. Such collaborations may lead to data sharing and joint tasks and activities. Hence, the collaborating organisations are responsible for managing and protecting data they share. Therefore, they should define a set of access contr...
Cloud computing is advantageous for customers and service providers. However, it has specific security requirements that are not captured by traditional access control models, e.g., secure information sharing in dynamic and collaborative environments. Risk-based access control models try to overcome these limitations, but while there are well-known enforcement mechanisms for traditional access ...
Üç alfa-karbonik anhidraz, insan karbonik anhidraz I, II (hCA I, II) ve koyun böbrek karbonik anhidraz (sCA) saflaştırıldı ve enzimlerle oksitetrasiklinin kinetik etkileşmeleri incelendi. Saflaştırma prosedürü homojenat hazırlama ve Sepharose 4B-trizonsüllfanilamid afinite kramatografisinden oluştu. Oksitetrasiklin hCA I, II ve sCA enzim aktivitelerinde in vitro aktivatör etkisi gösterdi. Bu an...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید