This report’s main goal is specifying syntax and semantics of the core of Protune, the policy language and metalanguage of REWERSE. The language can specify access control policies, privacy policies, reputation-based policies, provisional policies, and a class of business rules. The document also specifies the architecture of a distributed policy-based system, together with a suite of policy-related services. It introduces some policy filtering methodologies needed for negotiation semantics and query processing, and proves their properties in terms of information preservation or loss. We illustrate the language by means of numerous examples and outline a refined use case list for verbalization (i.e., formulation in controlled natural langua...
AbstractLanguage-based security approaches to access control and information flow control must at so...
AbstractThe paper presents ConSpec, an automata based policy specification language. The language tr...
We study the specification of access control policy in large-scale distributed systems. Our work on ...
Abstract. Formal policies allow the non-ambiguous definition of sit-uations in which usage of certai...
Natural language policies describe interactions between and across organizations, third-parties and ...
Abstract: Multimedia service providers on the web need their services to be well protected and easil...
This paper describes an open source policy editing API, whichhas been developed for use with privacy...
This short paper reports on a current project to conduct a detailed investigation into non-security ...
Abstract. Policies are being increasingly used for automated system manage-ment and controlling the ...
The paper presents ConSpec, an automata based policy specification language. The language trades off...
Policies are rules that govern the choices in behaviour of a system. Security policies define what a...
In defining large, complex access control policies, one would like to compose sub-policies, perhaps ...
Abstract—Policies can be used for the configuration and management of existing services, possibly at...
Security policy specification languages are a response to today\u27s complex and vulnerable software...
Web rule languages have recently emerged to enable different parties with different business rules a...
AbstractLanguage-based security approaches to access control and information flow control must at so...
AbstractThe paper presents ConSpec, an automata based policy specification language. The language tr...
We study the specification of access control policy in large-scale distributed systems. Our work on ...
Abstract. Formal policies allow the non-ambiguous definition of sit-uations in which usage of certai...
Natural language policies describe interactions between and across organizations, third-parties and ...
Abstract: Multimedia service providers on the web need their services to be well protected and easil...
This paper describes an open source policy editing API, whichhas been developed for use with privacy...
This short paper reports on a current project to conduct a detailed investigation into non-security ...
Abstract. Policies are being increasingly used for automated system manage-ment and controlling the ...
The paper presents ConSpec, an automata based policy specification language. The language trades off...
Policies are rules that govern the choices in behaviour of a system. Security policies define what a...
In defining large, complex access control policies, one would like to compose sub-policies, perhaps ...
Abstract—Policies can be used for the configuration and management of existing services, possibly at...
Security policy specification languages are a response to today\u27s complex and vulnerable software...
Web rule languages have recently emerged to enable different parties with different business rules a...
AbstractLanguage-based security approaches to access control and information flow control must at so...
AbstractThe paper presents ConSpec, an automata based policy specification language. The language tr...
We study the specification of access control policy in large-scale distributed systems. Our work on ...