2008 IEEE Workshop on Policies for Distributed Systems and Networks 2008
DOI: 10.1109/policy.2008.42
|View full text |Cite
|
Sign up to set email alerts
|

An Algebra for Integration and Analysis of Ponder2 Policies

Abstract: Abstract-Traditional policies often focus on access control requirement and there have been several proposals to define access control policy algebras to handle compositions and interactions. Recently, obligations are increasingly being expressed as part of security policies. However, their compositions and interactions have not yet been studied adequately. In this paper, we propose a policy algebra capturing both access control and obligation policies. The algebra consists of two policy constants and six basi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2008
2008
2018
2018

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 11 publications
0
8
0
Order By: Relevance
“…In such a situation, meta-policies are used to resolve the conflict. Policy conflicts can also be detected within the Ponder2 framework [31,38], where analysis is far more sophisticated than that developed for either KAoS or Rei, but analysis is restricted to design time. In general, different methods can be used to resolve conflicts between policies.…”
Section: Related Work and Discussionmentioning
confidence: 99%
“…In such a situation, meta-policies are used to resolve the conflict. Policy conflicts can also be detected within the Ponder2 framework [31,38], where analysis is far more sophisticated than that developed for either KAoS or Rei, but analysis is restricted to design time. In general, different methods can be used to resolve conflicts between policies.…”
Section: Related Work and Discussionmentioning
confidence: 99%
“…In such a situation, meta-policies are used to resolve the conflict. Policy conflicts can also be detected within the Ponder2 framework [18,23], where analysis is far more sophisticated than that developed for either KAoS or Rei, but analysis is restricted to design time. In general, different methods can be used to resolve conflicts between policies.…”
Section: Related Work and Discussionmentioning
confidence: 99%
“…The Ponder2 system is proving to be very versatile and has been applied in many projects both at Imperial College and by other institutions [15], [16]. Ponder2 has been utilised on robots, body sensor nodes and mobile telephones.…”
Section: Discussionmentioning
confidence: 99%