Deriving enforcement mechanisms for policies
dc.contributor.author | Zedan, Hussein | en |
dc.contributor.author | Cau, A. (Antonio) | en |
dc.contributor.author | Janicke, Helge | en |
dc.contributor.author | Siewe, Francois | en |
dc.date.accessioned | 2008-11-24T13:57:22Z | |
dc.date.available | 2008-11-24T13:57:22Z | |
dc.date.issued | 2007-06-01 | en |
dc.description | Policies provide a flexible and scalable approach to the management of distributed systems by separating the specification of security requirements and their enforcement. This paper addresses the development of enforcement mechanisms from a theoretical perspective and shows how enforcement code can be formally derived for compositional, history-dependent policies that can change dynamically over time or on the occurrence of events. The work is currently supported by the MoD-funded DIF-DTC projects: "Secure and Trusted Agents for Information Fusion" and "Trust Management in Collaborative Systems". The technology behind this work is known as SANTA which is now being exploited by GD Ltd. | en |
dc.identifier.citation | Zedan, H. et al. (2007) Deriving enforcement mechanisms for policies, Proceedings of the 8th IEEE International workshop on policies for distributed systems and networks policy 2007, pp. 161-170. | |
dc.identifier.doi | https://doi.org/10.1109/POLICY.2007.15 | |
dc.identifier.isbn | 0-7695-2767-1 | |
dc.identifier.uri | http://hdl.handle.net/2086/272 | |
dc.language.iso | en | en |
dc.researchgroup | Software Technology Research Laboratory (STRL) | |
dc.researchinstitute | Cyber Technology Institute (CTI) | en |
dc.subject | RAE 2008 | |
dc.subject | UoA 23 Computer Science and Informatics | |
dc.title | Deriving enforcement mechanisms for policies | en |
dc.type | Other | en |