z-logo
open-access-imgOpen Access
An End-To-End Approach to Distributed Policy Language Implementation
Author(s) -
Tom Chothia,
Dominic Duggan,
Ye Wu
Publication year - 2007
Publication title -
electronic notes in theoretical computer science
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.242
H-Index - 60
ISSN - 1571-0661
DOI - 10.1016/j.entcs.2007.03.010
Subject(s) - computer science , correctness , security policy , access control , domain specific language , control (management) , information flow , domain (mathematical analysis) , point (geometry) , programming language , computer security , artificial intelligence , mathematical analysis , linguistics , philosophy , geometry , mathematics
Language-based security approaches to access control and information flow control must at some point rely on a language for expressing policies. However there will in general be several choices for the correct policy language for any given application, and several choices for the implementation of a policy language in a given domain. This article considers an approach to implementing the policy language at the application level, relying on trusted cryptographic libraries whose interface security guarantees are used to verify the correctness of the policy language implementation

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom