We present a model for policy administration structures. The model consists of a mathematical notation that captures the relationship between policies and objects and the entities that manage policies for those objects. In the model a system is viewed as consisting of a number of policy administration domains. The domains are arranged in a hierarchy, representing descending levels of authority. The presence of an object in a domain represents the ability of the manager of that domain to write policy for that object. A number of important issues for policy administration are identified and addressed within the model. These include meta-policy questions, such as who has control over the placement of an object in a policy administration domain...
AbstractThis paper describes a mean field approach to defining and implementing policy-based system ...
Abstract. Many frameworks for defining authorization policies fail to make a clear distinction betwe...
In defining large, complex access control policies, one would like to compose sub-policies, perhaps ...
Since the 1970’s it has been acknowledged that a complex system can be broken into (a) its invariant...
Interpreting policy in automated managers facilitates the dynamic change of behaviour of a distribut...
Policies are rules that govern the choices in behaviour of a system. Security policies define what a...
Abstract—Policies can be used for the configuration and management of existing services, possibly at...
The ever-increasing size and complexity of large distributed systems makes management of such system...
This paper is part of a research program based on the thesis that the only reliable way for ensuring...
This chapter is concerned with the specification of management policy. Its aim is to treat policies ...
Policy management in organizations became rising issue in the last decade. It’s because of today’s r...
International audienceIn this work, we will focus on the work undertaken in the specification of pol...
Policies play an essential role in any management system. They provide a mechanism to enforce rules ...
We outline a framework for specifying management roles which defines both authorisation and obligati...
Simplifying the administration of location-based access-control policies requires a mechanism that s...
AbstractThis paper describes a mean field approach to defining and implementing policy-based system ...
Abstract. Many frameworks for defining authorization policies fail to make a clear distinction betwe...
In defining large, complex access control policies, one would like to compose sub-policies, perhaps ...
Since the 1970’s it has been acknowledged that a complex system can be broken into (a) its invariant...
Interpreting policy in automated managers facilitates the dynamic change of behaviour of a distribut...
Policies are rules that govern the choices in behaviour of a system. Security policies define what a...
Abstract—Policies can be used for the configuration and management of existing services, possibly at...
The ever-increasing size and complexity of large distributed systems makes management of such system...
This paper is part of a research program based on the thesis that the only reliable way for ensuring...
This chapter is concerned with the specification of management policy. Its aim is to treat policies ...
Policy management in organizations became rising issue in the last decade. It’s because of today’s r...
International audienceIn this work, we will focus on the work undertaken in the specification of pol...
Policies play an essential role in any management system. They provide a mechanism to enforce rules ...
We outline a framework for specifying management roles which defines both authorisation and obligati...
Simplifying the administration of location-based access-control policies requires a mechanism that s...
AbstractThis paper describes a mean field approach to defining and implementing policy-based system ...
Abstract. Many frameworks for defining authorization policies fail to make a clear distinction betwe...
In defining large, complex access control policies, one would like to compose sub-policies, perhaps ...