Expressing a policy

M.R. Low

    Research output: Book/ReportOther report

    33 Downloads (Pure)


    Policies, in particular security policies, are typically modelled using access control lists. This technique is not sufficient to model the full 'semantics' of a policy, especially when it applies to a task executed in a distributed environment. This article proposes a different means of expressing a policy based on extended capabilities.
    Original languageEnglish
    PublisherUniversity of Hertfordshire
    Publication statusPublished - 1996

    Publication series

    NameUH Computer Science Technical Report
    PublisherUniversity of Hertfordshire


    Dive into the research topics of 'Expressing a policy'. Together they form a unique fingerprint.

    Cite this