[go: up one dir, main page]

Bonatti et al., 2002 - Google Patents

A uniform framework for regulating service access and information release on the web

Bonatti et al., 2002

Document ID
10690792762967616011
Author
Bonatti P
Samarati P
Publication year
Publication venue
Journal of Computer Security

External Links

Snippet

The widespread use of Internet-based services is increasing the amount of information (such as user profiles) that clients are required to disclose. This information demand is necessary for regulating access to services, and functionally convenient (eg, to support service …
Continue reading at journals.sagepub.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0464Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0807Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/24Presence management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/30Network-specific arrangements or communication protocols supporting networked applications involving profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/16Service discovery or service management, e.g. service location protocol [SLP] or Web services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements or protocols for real-time communications
    • H04L65/10Signalling, control or architecture
    • H04L65/1013Network architectures, gateways, control or user entities

Similar Documents

Publication Publication Date Title
Bonatti et al. A uniform framework for regulating service access and information release on the web
Bonatti et al. Regulating service access and information release on the web
US20200090079A1 (en) System and method for specifying and processing legality expressions
Seamons et al. Requirements for policy languages for trust negotiation
Bertino et al. Trust-/spl Xscr/;: a peer-to-peer framework for trust establishment
US20170083720A1 (en) Rights-based system
KR100621318B1 (en) Method for managing access and resource usage by validation of conditions
KR100821086B1 (en) Network Linked Service Licensing System and Method
Ardagna et al. Towards privacy-enhanced authorization policies and languages
Beresnevichiene A role and context based security model
CN101405760A (en) System and method for rights offering and granting using shared state variables
Ardagna et al. Supporting privacy preferences in credential-based interactions
Massacci et al. Privacy is linking permission to purpose
WO2002101491A2 (en) Rights offering and granting
Nazareth Spade: Spki/sdsi for attribute release policies in a distributed environment
TWI227846B (en) Method and apparatus managing the transfer of rights
Ungureanu Efficient support for enterprise delegation policies
Bracher Secure information flow for inter-organisational collaborative environments
Pekárek Final requirements and state-of-the-art for next generation policies
Schreiner Security and privacy management in service oriented architectures
Casassa-Mont Architecture V2 Author: WP 14.2 Editor: Marco Casassa-Mont, Stefano Crosta, Thomas Kriegelstein, Dieter Sommer Reviewers
W3C et al. Report on design and implementation
Li A framework to enforce privacy in business processes
Dzbor D4. 4.1 The role of access rights in ontology customization
SAP First research report on research on next generation policies