dc.contributor.author | Low, M.R. | |
dc.date.accessioned | 2011-01-05T13:47:57Z | |
dc.date.available | 2011-01-05T13:47:57Z | |
dc.date.issued | 1996 | |
dc.identifier.citation | Low , M R 1996 , Expressing a policy . UH Computer Science Technical Report , vol. 266 , University of Hertfordshire . | |
dc.identifier.other | dspace: 2299/5106 | |
dc.identifier.uri | http://hdl.handle.net/2299/5106 | |
dc.description.abstract | Policies, in particular security policies, are typically modelled using access control lists. This technique is not sufficient to model the full 'semantics' of a policy, especially when it applies to a task executed in a distributed environment. This article proposes a different means of expressing a policy based on extended capabilities. | en |
dc.format.extent | 2168566 | |
dc.language.iso | eng | |
dc.publisher | University of Hertfordshire | |
dc.relation.ispartofseries | UH Computer Science Technical Report | |
dc.title | Expressing a policy | en |
dc.contributor.institution | School of Computer Science | |
rioxxterms.type | Other | |
herts.preservation.rarelyaccessed | true | |