Abstract—Traditional policies often focus on access control re-quirement and there have been several proposals to define access control policy algebras to handle their compositions. Recently, obligations are increasingly being expressed as part of security policies. However, the compositions and interactions between these two have not yet been studied adequately. In this paper, we propose an algebra capturing both authorization and obligation policies. The algebra consists of two policy constants and six basic operations. It provides language independent mechanisms to manage policies. As a concrete example, we instantiate the algebra for the Ponder2 policy language. I
Abstract. Many languages and algebras have been proposed in recent years for the specification of au...
Collaborative and distributed applications, such as dynamic coalitions and virtualized grid computin...
Collaborative and distributed applications, such as dynamic coalitions and virtualized grid computin...
Abstract—Traditional policies often focus on access control re-quirement and there have been several...
Traditional policies often focus on access control requirement and there have been several proposals...
Despite considerable advancements in the area of access control and authorization languages, current...
Security-sensitive environments protect their information resources against unauthorized use by enfo...
Despite considerable advancements in the area of access control and authorization languages, current...
This paper proposes a D-algebra to compose decisions from multiple access control policies. Compared...
AbstractConfidentiality of information is an important aspect that developers should take into consi...
Access control is the traditional center of gravity of computer security [1]. People specify access ...
In defining large, complex access control policies, one would like to compose sub-policies, perhaps ...
A major drawback of existing access control systems is that they have all been developed with a spec...
AbstractIn this paper we propose a formalization of access control policies based on term rewriting....
In this paper we propose a formalization of access control policies based on term rewriting. The sta...
Abstract. Many languages and algebras have been proposed in recent years for the specification of au...
Collaborative and distributed applications, such as dynamic coalitions and virtualized grid computin...
Collaborative and distributed applications, such as dynamic coalitions and virtualized grid computin...
Abstract—Traditional policies often focus on access control re-quirement and there have been several...
Traditional policies often focus on access control requirement and there have been several proposals...
Despite considerable advancements in the area of access control and authorization languages, current...
Security-sensitive environments protect their information resources against unauthorized use by enfo...
Despite considerable advancements in the area of access control and authorization languages, current...
This paper proposes a D-algebra to compose decisions from multiple access control policies. Compared...
AbstractConfidentiality of information is an important aspect that developers should take into consi...
Access control is the traditional center of gravity of computer security [1]. People specify access ...
In defining large, complex access control policies, one would like to compose sub-policies, perhaps ...
A major drawback of existing access control systems is that they have all been developed with a spec...
AbstractIn this paper we propose a formalization of access control policies based on term rewriting....
In this paper we propose a formalization of access control policies based on term rewriting. The sta...
Abstract. Many languages and algebras have been proposed in recent years for the specification of au...
Collaborative and distributed applications, such as dynamic coalitions and virtualized grid computin...
Collaborative and distributed applications, such as dynamic coalitions and virtualized grid computin...