Bonatti et al., 2002 - Google Patents
A uniform framework for regulating service access and information release on the webBonatti et al., 2002
- Document ID
- 10690792762967616011
- Author
- Bonatti P
- Samarati P
- Publication year
- Publication venue
- Journal of Computer Security
External Links
Snippet
The widespread use of Internet-based services is increasing the amount of information (such as user profiles) that clients are required to disclose. This information demand is necessary for regulating access to services, and functionally convenient (eg, to support service …
- 230000001105 regulatory 0 title abstract description 40
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0464—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0807—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/24—Presence management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/30—Network-specific arrangements or communication protocols supporting networked applications involving profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/16—Service discovery or service management, e.g. service location protocol [SLP] or Web services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements or protocols for real-time communications
- H04L65/10—Signalling, control or architecture
- H04L65/1013—Network architectures, gateways, control or user entities
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bonatti et al. | A uniform framework for regulating service access and information release on the web | |
Bonatti et al. | Regulating service access and information release on the web | |
US20200090079A1 (en) | System and method for specifying and processing legality expressions | |
Seamons et al. | Requirements for policy languages for trust negotiation | |
Bertino et al. | Trust-/spl Xscr/;: a peer-to-peer framework for trust establishment | |
US20170083720A1 (en) | Rights-based system | |
KR100621318B1 (en) | Method for managing access and resource usage by validation of conditions | |
KR100821086B1 (en) | Network Linked Service Licensing System and Method | |
Ardagna et al. | Towards privacy-enhanced authorization policies and languages | |
Beresnevichiene | A role and context based security model | |
CN101405760A (en) | System and method for rights offering and granting using shared state variables | |
Ardagna et al. | Supporting privacy preferences in credential-based interactions | |
Massacci et al. | Privacy is linking permission to purpose | |
WO2002101491A2 (en) | Rights offering and granting | |
Nazareth | Spade: Spki/sdsi for attribute release policies in a distributed environment | |
TWI227846B (en) | Method and apparatus managing the transfer of rights | |
Ungureanu | Efficient support for enterprise delegation policies | |
Bracher | Secure information flow for inter-organisational collaborative environments | |
Pekárek | Final requirements and state-of-the-art for next generation policies | |
Schreiner | Security and privacy management in service oriented architectures | |
Casassa-Mont | Architecture V2 Author: WP 14.2 Editor: Marco Casassa-Mont, Stefano Crosta, Thomas Kriegelstein, Dieter Sommer Reviewers | |
W3C et al. | Report on design and implementation | |
Li | A framework to enforce privacy in business processes | |
Dzbor | D4. 4.1 The role of access rights in ontology customization | |
SAP | First research report on research on next generation policies |