Abstract
Policies, in particular security policies, are typically modelled using access control lists. This technique is not sufficient to model the full 'semantics' of a policy, especially when it applies to a task executed in a distributed environment. This article proposes a different means of expressing a policy based on extended capabilities.
Original language | English |
---|---|
Publisher | University of Hertfordshire |
Publication status | Published - 1996 |
Publication series
Name | UH Computer Science Technical Report |
---|---|
Publisher | University of Hertfordshire |
Volume | 266 |