Abstract. We present the Simple Unified Policy Programming Lan-guage (Suppl), a domain-neutral language for stating, executing, and analyzing event-condition-action policies. Suppl uses a novel combina-tion of pure logic programming and disciplined imperative programming features to make it easy for non-expert users to express common policy idioms. The language is strongly typed and moded to allow static detec-tion of common programming errors, and it supports a novel logic-based static analysis that can detect internally inconsistent policies. Suppl has been implemented as a compiler to Prolog and used to build several network security applications in a Java framework.
AbstractLanguage-based security approaches to access control and information flow control must at so...
Security policy specification languages are a response to today\u27s complex and vulnerable software...
PolicyUpdater is a fully-implemented authorisation system that provides policy evaluations as well a...
A security policy presents a critical component of the overall security architecture and an essentia...
Policies are rules that govern the choices in behaviour of a system. Security policies define what a...
In this report a survey of current network policy languages is presented. Next, a summary of the tec...
International audienceThis paper presents a comparative study of policy specification lan- guages. O...
Current policy languages come with a monolithic syntax and support only a limited set of security f...
A runtime monitor is a program that runs in parallel with an un-trusted application and examines act...
In this paper, we present a policy-based approach for au- tomating the integration of security mecha...
Abstract. Formal policies allow the non-ambiguous definition of sit-uations in which usage of certai...
Abstract. In distributed computer systems, it is possible that the eval-uation of an authorization p...
Most organizations use several security policies to con-trol different systems and data, comprising ...
Abstract. Many frameworks for defining authorization policies fail to make a clear distinction betwe...
© Springer-Verlag Berlin Heidelberg 2002. This paper presents a comparative study of policy specific...
AbstractLanguage-based security approaches to access control and information flow control must at so...
Security policy specification languages are a response to today\u27s complex and vulnerable software...
PolicyUpdater is a fully-implemented authorisation system that provides policy evaluations as well a...
A security policy presents a critical component of the overall security architecture and an essentia...
Policies are rules that govern the choices in behaviour of a system. Security policies define what a...
In this report a survey of current network policy languages is presented. Next, a summary of the tec...
International audienceThis paper presents a comparative study of policy specification lan- guages. O...
Current policy languages come with a monolithic syntax and support only a limited set of security f...
A runtime monitor is a program that runs in parallel with an un-trusted application and examines act...
In this paper, we present a policy-based approach for au- tomating the integration of security mecha...
Abstract. Formal policies allow the non-ambiguous definition of sit-uations in which usage of certai...
Abstract. In distributed computer systems, it is possible that the eval-uation of an authorization p...
Most organizations use several security policies to con-trol different systems and data, comprising ...
Abstract. Many frameworks for defining authorization policies fail to make a clear distinction betwe...
© Springer-Verlag Berlin Heidelberg 2002. This paper presents a comparative study of policy specific...
AbstractLanguage-based security approaches to access control and information flow control must at so...
Security policy specification languages are a response to today\u27s complex and vulnerable software...
PolicyUpdater is a fully-implemented authorisation system that provides policy evaluations as well a...