Expressing a policy
Low, M.R.
(1996)
Expressing a policy.
University of Hertfordshire.
Policies, in particular security policies, are typically modelled using access control lists. This technique is not sufficient to model the full 'semantics' of a policy, especially when it applies to a task executed in a distributed environment. This article proposes a different means of expressing a policy based on extended capabilities.
Item Type | Other |
---|---|
Date Deposited | 14 Nov 2024 11:26 |
Last Modified | 14 Nov 2024 11:26 |
-
picture_as_pdf - CSTR 266.pdf
Share this file
Downloads