Policies are rules that govern the choices in behaviour of a system. Security policies define what actions are permitted or not permitted, for what or for whom, and under what conditions. Management policies define what actions need to be carried out when specific events occur within a system or what resources must be allocated under specific conditions. There is considerable interest in the use of policies for the security and management of large-scale networks and distributed services. Existing policy work has focussed on specification, information models and applicationspecific policy enforcement. We address the important goal of providing a generalpurpose deployment model for policies that is independent of the underlying policy enforce...
Contemporary group communication systems address the security requirements envisioned by software de...
Interpreting policy in automated managers facilitates the dynamic change of behaviour of a distribut...
This paper presents a framework for specifying policies for the management of network services. Alth...
Security management involves specification and deployment of access control policies as well as acti...
Policy enforcement, or making sure that software behaves in line with a set of rules, is a problem o...
Security in computer systems is concerned with protecting resources from unauthorized access while e...
The ever-increasing size and complexity of large distributed systems makes management of such system...
International audienceIn this work, we will focus on the work undertaken in the specification of pol...
Abstract | In this article we describe a componentized framework for dynamic security policies. The ...
International audienceThis paper presents a comparative study of policy specification lan- guages. O...
Usage control is a generalization of access control that specifies and enforces what must or must no...
Policy deployment is the process by which policy editing commands are issued on firewall, so that th...
As enterprises begin to increasingly conduct their businesses over multiple interconnected networks ...
This paper introduces the Ponder language for specibing distributed object enterprise concepts. Pond...
Abstract—Policies can be used for the configuration and management of existing services, possibly at...
Contemporary group communication systems address the security requirements envisioned by software de...
Interpreting policy in automated managers facilitates the dynamic change of behaviour of a distribut...
This paper presents a framework for specifying policies for the management of network services. Alth...
Security management involves specification and deployment of access control policies as well as acti...
Policy enforcement, or making sure that software behaves in line with a set of rules, is a problem o...
Security in computer systems is concerned with protecting resources from unauthorized access while e...
The ever-increasing size and complexity of large distributed systems makes management of such system...
International audienceIn this work, we will focus on the work undertaken in the specification of pol...
Abstract | In this article we describe a componentized framework for dynamic security policies. The ...
International audienceThis paper presents a comparative study of policy specification lan- guages. O...
Usage control is a generalization of access control that specifies and enforces what must or must no...
Policy deployment is the process by which policy editing commands are issued on firewall, so that th...
As enterprises begin to increasingly conduct their businesses over multiple interconnected networks ...
This paper introduces the Ponder language for specibing distributed object enterprise concepts. Pond...
Abstract—Policies can be used for the configuration and management of existing services, possibly at...
Contemporary group communication systems address the security requirements envisioned by software de...
Interpreting policy in automated managers facilitates the dynamic change of behaviour of a distribut...
This paper presents a framework for specifying policies for the management of network services. Alth...