期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
On the Power Attribute of the Court of Admiralty of England in the Tudor Dynasty
1
作者 HAN Chenguang 《Cultural and Religious Studies》 2022年第12期702-714,共13页
Why the court of admiralty of England reached its peak during the Tudor period is a long-standing issue in academic circles,and it is necessary to clarify the attribute of the Court of Admiralty before answering this ... Why the court of admiralty of England reached its peak during the Tudor period is a long-standing issue in academic circles,and it is necessary to clarify the attribute of the Court of Admiralty before answering this question.A comprehensive inspection of the admirals,judges of admiralty courts’patents,and statutes of the realm during the Tudor period reveals that,on the one hand,the court of admiralty passed the substantive admirals’judicial privileges,the typification of court of admiralty orders,and the autonomy of trial and enforcement privileges.On the other hand,on the basic of maritime upstarts,the court of admiralty,got rid of the control of the royal power and became an independent force in the English judicial system.The substantively operating independently court of admiralty may be the first comprehensive national judicial institution established in England in the early modern period. 展开更多
关键词 Tudor Dynasty Court of Admiralty power attributes
下载PDF
A framework for the extended evaluation of ABAC policies 被引量:1
2
作者 Charles Morisset Tim A.C.Willemse Nicola Zannone 《Cybersecurity》 CSCD 2019年第1期117-137,共21页
A main challenge of attribute-based access control(ABAC)is the handling of missing information.Several studies have shown that the way standard ABAC mechanisms,e.g.based on XACML,handle missing information is flawed,m... A main challenge of attribute-based access control(ABAC)is the handling of missing information.Several studies have shown that the way standard ABAC mechanisms,e.g.based on XACML,handle missing information is flawed,making ABAC policies vulnerable to attribute-hiding attacks.Recent work has addressed the problem of missing information in ABAC by introducing the notion of extended evaluation,where the evaluation of a query considers all queries that can be obtained by extending the initial query.This method counters attribute-hiding attacks,but a na飗e implementation is intractable,as it requires an evaluation of the whole query space.In this paper,we present a framework for the extended evaluation of ABAC policies.The framework relies on Binary Decision Diagram(BDDs)data structures for the efficient computation of the extended evaluation of ABAC policies.We also introduce the notion of query constraints and attribute value power to avoid evaluating queries that do not represent a valid state of the system and to identify which attribute values should be considered in the computation of the extended evaluation,respectively.We illustrate our framework using three real-world policies,which would be intractable with the original method but which are analyzed in seconds using our framework. 展开更多
关键词 Attribute-based access control Policy evaluation Missing attributes Attribute power Attribute-hiding attacks
原文传递
A framework for the extended evaluation of ABAC policies
3
作者 Charles Morisset Tim A.C.Willemse Nicola Zannone 《Cybersecurity》 2018年第1期392-412,共21页
A main challenge of attribute-based access control(ABAC)is the handling of missing information.Several studies have shown that the way standard ABAC mechanisms,e.g.based on XACML,handle missing information is flawed,m... A main challenge of attribute-based access control(ABAC)is the handling of missing information.Several studies have shown that the way standard ABAC mechanisms,e.g.based on XACML,handle missing information is flawed,making ABAC policies vulnerable to attribute-hiding attacks.Recent work has addressed the problem of missing information in ABAC by introducing the notion of extended evaluation,where the evaluation of a query considers all queries that can be obtained by extending the initial query.This method counters attribute-hiding attacks,but a naïve implementation is intractable,as it requires an evaluation of the whole query space.In this paper,we present a framework for the extended evaluation of ABAC policies.The framework relies on Binary Decision Diagram(BDDs)data structures for the efficient computation of the extended evaluation of ABAC policies.We also introduce the notion of query constraints and attribute value power to avoid evaluating queries that do not represent a valid state of the system and to identify which attribute values should be considered in the computation of the extended evaluation,respectively.We illustrate our framework using three real-world policies,which would be intractable with the original method but which are analyzed in seconds using our framework. 展开更多
关键词 Attribute-based access control Policy evaluation Missing attributes Attribute power Attribute-hiding attacks
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部