Why Using XACML as oneM2M Access Control Policy Group Name: WG4 Source: Wei Zhou, CATT, [email protected] Meeting Date: Agenda Item:
XACML 2.0 in the Enterprise: Use-Cases and Deployment Challenges
Audumbar. Access control and privacy Who can access what, under what conditions, and for what purpose.
XACML 2.0 in the Enterprise: Use- Cases and Deployment Challenges Prateek Mishra, Frank Villavicencio, Rich Levinson Oracle Identity Management Group 02/07/2006.