University of Hertfordshire

Expressing a policy

Research output: Book/ReportOther report

Documents

  • M.R. Low
View graph of relations
Original languageEnglish
PublisherUniversity of Hertfordshire
Publication statusPublished - 1996

Publication series

NameUH Computer Science Technical Report
PublisherUniversity of Hertfordshire
Volume266

Abstract

Policies, in particular security policies, are typically modelled using access control lists. This technique is not sufficient to model the full 'semantics' of a policy, especially when it applies to a task executed in a distributed environment. This article proposes a different means of expressing a policy based on extended capabilities.

ID: 99931