Expressing a policy
Low, M.R.
(1996)
Expressing a policy.
UH Computer Science Technical Report
.
University of Hertfordshire.
Policies, in particular security policies, are typically modelled using access control lists. This technique is not sufficient to model the full 'semantics' of a policy, especially when it applies to a task executed in a distributed environment. This article proposes a different means of expressing a policy based on extended capabilities.
Item Type | Book |
---|---|
Date Deposited | 15 May 2025 16:00 |
Last Modified | 30 May 2025 23:22 |
Explore Further
-
picture_as_pdf - CSTR+266.pdf
Share this file
Downloads