Expressing a policy

M.R. Low

    Research output: Book/ReportOther report

    37 Downloads (Pure)

    Abstract

    Policies, in particular security policies, are typically modelled using access control lists. This technique is not sufficient to model the full 'semantics' of a policy, especially when it applies to a task executed in a distributed environment. This article proposes a different means of expressing a policy based on extended capabilities.
    Original languageEnglish
    PublisherUniversity of Hertfordshire
    Publication statusPublished - 1996

    Publication series

    NameUH Computer Science Technical Report
    PublisherUniversity of Hertfordshire
    Volume266

    Fingerprint

    Dive into the research topics of 'Expressing a policy'. Together they form a unique fingerprint.

    Cite this