Databases Reference
In-Depth Information
access target matches and the optional conditions match, is used to decide
the result of the request.
These decision combining algorithms allow administrators to provide var-
ious levels of security restrictions on their sensitive data.
Access Request.
XACML defines the format for the request message that provides context
for the policy-based decisions. Each request may contain multiple Subject
elements and multiple attributes for the Subject, Resource and Action.
Figure 6 shows a sample XACML Request Context format where Robert
requests a read access for the first entry element of the review summary XML
document. The request context consisting of three sub-structures, Subject
information, Resource information, and Action information, each consisting
of one or more attribute type-value pairs. In this example, subject-id and
role are attribute types and Robert and reviewerName are attribute values,
respectively. It is assumed that those attributes are given by a separate au-
thentication mechanism that is out of the scope of the XACML specification.
Regarding to resource information, the XACML request context can con-
tain the target XML data as relevant information about the target resource.
The ResourceContent element contains the review summary XML data with
the namespace prefixed by rs: . The target XML document is referred to from
the access control policy using the AttributeSelector function. For exam-
ple, rule R3-2 of Figure 5 specifies the path, //rs:review summary/rs:entry
/rs:review/rs:reviewerName/text() , which refers to Robert .Thisisone
of the advantages of the XACML policy model that allows the policy to refer
to any of the values of the target XML data as embedded in the Request
Context and to compare those values against constant values.
Access Response.
The response message defined by XACML provides the format for conveying
the Decision ( Deny or Permit ) and the Status of an access request evaluation
as Figure 7 shows. In our example, the decision is Deny since the requested
entry element contains an AuthorName element that should not be acces-
sible to the Reviewer. The EntireHierarchy scope parameter specified in
the Resource of the XACML Request Context defines the semantics of the
response context such that if any of the descendants nodes of the requested
node have one or more access-denial nodes, then the resulting decision should
be a denial.
4.3 WS-Policy
WS-Policy Framework [20] is a W3C standard Web services governance spec-
ification that enables a service to specify what it expects of callers and how
 
Search WWH ::




Custom Search