Security management involves specification and deployment of access control policies as well as activities such as registration of users or logging and auditing events for dealing with access to critical resources or security violations. The management actions to be performed when an event occurs depend on the enterprise policy. Reusable composite policy specifications are important to cater for the complexity of large enterprise information systems. Analysing policies for conflicts is essential for the safe operation of the system. This paper describes the Ponder language for specifying policies for security management of Distributed Systems. Ponder is declarative, stronglytyped and object-oriented which makes the language flexible, scalab...
iii Advances in telecommunications technology have resulted in the proliferation of large distribute...
Nowadays we have very large distributed, partially untrusted systems distributed on the internet. As...
This paper presents a mechanism for the consistent enforcement of security policies within a distrib...
Policies are rules that govern the choices in behaviour of a system. Security policies define what a...
This paper introduces the Ponder language for specibing distributed object enterprise concepts. Pond...
Security in computer systems is concerned with protecting resources from unauthorized access while e...
Policy enforcement, or making sure that software behaves in line with a set of rules, is a problem o...
Part 6: Policy and Access ControlInternational audienceExpressing security policies to govern distri...
Most organizations use several security policies to con-trol different systems and data, comprising ...
Contemporary group communication systems address the security requirements envisioned by software de...
Expressing security policies to govern distributed systems is a complex and error-prone task. Polici...
Expressing security policies to govern distributed systems is a complex and error-prone task. Polici...
© Springer-Verlag Berlin Heidelberg 2002. This paper presents a comparative study of policy specific...
With the rapid growth of the information age, electronic activities of many kinds are becoming more ...
International audienceThis paper presents a comparative study of policy specification lan- guages. O...
iii Advances in telecommunications technology have resulted in the proliferation of large distribute...
Nowadays we have very large distributed, partially untrusted systems distributed on the internet. As...
This paper presents a mechanism for the consistent enforcement of security policies within a distrib...
Policies are rules that govern the choices in behaviour of a system. Security policies define what a...
This paper introduces the Ponder language for specibing distributed object enterprise concepts. Pond...
Security in computer systems is concerned with protecting resources from unauthorized access while e...
Policy enforcement, or making sure that software behaves in line with a set of rules, is a problem o...
Part 6: Policy and Access ControlInternational audienceExpressing security policies to govern distri...
Most organizations use several security policies to con-trol different systems and data, comprising ...
Contemporary group communication systems address the security requirements envisioned by software de...
Expressing security policies to govern distributed systems is a complex and error-prone task. Polici...
Expressing security policies to govern distributed systems is a complex and error-prone task. Polici...
© Springer-Verlag Berlin Heidelberg 2002. This paper presents a comparative study of policy specific...
With the rapid growth of the information age, electronic activities of many kinds are becoming more ...
International audienceThis paper presents a comparative study of policy specification lan- guages. O...
iii Advances in telecommunications technology have resulted in the proliferation of large distribute...
Nowadays we have very large distributed, partially untrusted systems distributed on the internet. As...
This paper presents a mechanism for the consistent enforcement of security policies within a distrib...