Expressing a policy
Low, M.R.
(1996)
Expressing a policy.
[Report]
Policies, in particular security policies, are typically modelled using access control lists. This technique is not sufficient to model the full 'semantics' of a policy, especially when it applies to a task executed in a distributed environment. This article proposes a different means of expressing a policy based on extended capabilities.
Item Type | Report |
---|---|
Date Deposited | 15 May 2025 16:00 |
Last Modified | 19 Aug 2025 01:45 |
Explore Further
-
picture_as_pdf - CSTR+266.pdf
Share this file
Downloads