Show simple item record

dc.contributor.authorLow, M.R.
dc.date.accessioned2011-01-05T13:47:57Z
dc.date.available2011-01-05T13:47:57Z
dc.date.issued1996
dc.identifier.citationLow , M R 1996 , Expressing a policy . UH Computer Science Technical Report , vol. 266 , University of Hertfordshire .
dc.identifier.otherPURE: 99931
dc.identifier.otherPURE UUID: 0fb674c1-1e9d-4477-b13b-a0b22ddda5ee
dc.identifier.otherdspace: 2299/5106
dc.identifier.urihttp://hdl.handle.net/2299/5106
dc.description.abstractPolicies, in particular security policies, are typically modelled using access control lists. This technique is not sufficient to model the full 'semantics' of a policy, especially when it applies to a task executed in a distributed environment. This article proposes a different means of expressing a policy based on extended capabilities.en
dc.language.isoeng
dc.publisherUniversity of Hertfordshire
dc.relation.ispartofseriesUH Computer Science Technical Report
dc.titleExpressing a policyen
dc.contributor.institutionSchool of Computer Science
rioxxterms.typeOther
herts.preservation.rarelyaccessedtrue


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record