access_control-xacml-2.0-core-spec-os 1 February 2005
Copyright © OASIS Open 2004. All Rights Reserved. Page 5 of 141
7.2.2.
Attribute bags ..........................................................................................................16 134
7.2.3.
Multivalued attributes...............................................................................................16 135
7.2.4.
Attribute Matching....................................................................................................16 136
7.2.5.
Attribute Retrieval....................................................................................................16 137
7.2.6.
Environment Attributes ............................................................................................16 138
7.3.
Expression evaluation .....................................................................................................16 139
7.4.
Arithmetic evaluation .......................................................................................................16 140
7.5.
Match evaluation .............................................................................................................16 141
7.6.
Target evaluation.............................................................................................................16 142
7.7.
VariableReference Evaluation.........................................................................................16 143
7.8.
Condition evaluation........................................................................................................16 144
7.9.
Rule evaluation................................................................................................................16 145
7.10.
Policy evaluation..............................................................................................................16 146
7.11.
Policy Set evaluation .......................................................................................................16 147
7.12.
Hierarchical resources.....................................................................................................16 148
7.13.
Authorization decision .....................................................................................................16 149
7.14.
Obligations.......................................................................................................................16 150
7.15.
Exception handling ..........................................................................................................16 151
7.15.1.
Unsupported functionality........................................................................................16 152
7.15.2.
Syntax and type errors ............................................................................................16 153
7.15.3.
Missing attributes.....................................................................................................16 154
8. XACML extensibility points (non-normative).............................................................................16 155
8.1.
Extensible XML attribute types........................................................................................16 156
8.2.
Structured attributes ........................................................................................................16 157
9. Security and privacy considerations (non-normative)...............................................................16 158
9.1.
Threat model ...................................................................................................................16 159
9.1.1. Unauthorized disclosure..........................................................................................16 160
9.1.2. Message replay .......................................................................................................16 161
9.1.3. Message insertion ...................................................................................................16 162
9.1.4. Message deletion ....................................................................................................16 163
9.1.5. Message modification..............................................................................................16 164
9.1.6. NotApplicable results...............................................................................................16 165
9.1.7. Negative rules..........................................................................................................16 166
9.2.
Safeguards ......................................................................................................................16 167
9.2.1. Authentication..........................................................................................................16 168
9.2.2. Policy administration................................................................................................16 169