\begin{thebibliography}{10} \bibitem{chad02} {\sc Chadwick, D.~W., and Otenko, A.} \newblock Rbac policies in xml for x.509 based privilege management. \newblock In {\em Int. Conf. On Information Security\/} (2002), pp.~39--53. \bibitem{chad03} {\sc Chadwick, D.~W., and Otenko, A.} \newblock The permis x.509 role based privilege management infrastructure. \newblock {\em Future Gener. Comput. Syst. 19}, 2 (2003), 277--289. \bibitem{ferra95} {\sc D.~Ferraiolo, J.~C., and Kuhn, D.~R.} \newblock Role-based access control: Features and motivations. \newblock {\em Computer Security Applications Conference\/} (1995), 241.248. \bibitem{xacml} {\sc eXtensible Access Control Markup Language~(XACML)}. \newblock authorization policies specification in xml, 2004. \bibitem{ferra92} {\sc Ferraiolo, D., and Kuhn., D.~R.} \newblock Role-based access control. \newblock {\em 15th NIST-NCSC National Computer Security Conference\/} (1992), 554--563. \bibitem{apache} {\sc Jakarta}. \newblock http://www.apache.org/, 2004. \bibitem{javier03} {\sc Javier~Lopez, Antonio~Mana, J. J. O. J. M.~T., and Yague, M.~I.} \newblock Integrating pmi services in corba applications. \newblock {\em Comput. Stand. Interfaces 25}, 4 (2003), 391--409. \bibitem{modssl} {\sc ModSSL}. \newblock http://www.modssl.org/, 2004. \bibitem{rbacstd04} {\sc NIST}. \newblock Role-based access control, 2004. \bibitem{openldap} {\sc OpenLDAP}. \newblock The open source lightweight directory access protocol (ldap), 2004. \bibitem{openssl} {\sc OpenSSL}. \newblock The open source toolkit for ssl/tls., 2004. \bibitem{charles02} {\sc {Phillips, Jr.}, C.~E., Ting, T., and Demurjian, S.~A.} \newblock Information sharing and security in dynamic coalitions. \newblock In {\em Proceedings of the seventh ACM symposium on Access control models and technologies\/} (2002), ACM Press, pp.~87--96. \bibitem{sandhu96} {\sc R.~Sandhu, E. J.~Coyne, H. L.~F., and Youman., C.~E.} \newblock Role-based access control models. \newblock {\em IEEE Computer 29\/} (1996), 38--47. \bibitem{rfc3281} {\sc S.~Farrell, R.~H.} \newblock An internet attribute certificate profile for authorization, 2002. \bibitem{sterne92} {\sc Sterne., D.~F.} \newblock A tcb subset for integrity and role-based access control. \newblock {\em 15th NIST-NCSC National Computer Security Conference NIST/NSA\/} (1992). \bibitem{mary03} {\sc Thompson, M.~R., Essiari, A., and Mudumbai, S.} \newblock Certificate-based authorization policy in a pki environment. \newblock {\em ACM Trans. Inf. Syst. Secur. 6}, 4 (2003), 566--588. \bibitem{vonsolms94} {\sc {von Solms}, S.~H., and {van der Merwe}, I.} \newblock The management of computer security profiles using a role-oriented approach. \newblock {\em Comput. Secur. 13}, 9 (1994), 673--680. \end{thebibliography}