2011 IEEE International Symposium on Policies for Distributed Systems and Networks 2011
DOI: 10.1109/policy.2011.21
|View full text |Cite
|
Sign up to set email alerts
|

Policy of Composition ? Composition of Policies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…In this perspective, already discussed techniques based on static composition of policies such [10,14] may not be suitable for highly dynamic environments.…”
Section: Dynamicitymentioning
confidence: 99%
See 2 more Smart Citations
“…In this perspective, already discussed techniques based on static composition of policies such [10,14] may not be suitable for highly dynamic environments.…”
Section: Dynamicitymentioning
confidence: 99%
“…In addition, Ref. [10] presents an approach that merges existing policies and restrictions into a new policy to remove redundancy and inconsistencies. It is important to point out how the process of policy composition might be very expensive from a computational perspective; as a consequence, these solutions can only be applied if we assume static policies (i.e., not changing over the time), so that the composition process can be performed only once off-line, when the composite service is made up.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The authors of [23] leverage the linked data architecture for providing authorizations (based on WebID [24]) and access restrictions at the document level. To address the privacy concerns in the emerging domains of linked data usage, the authors of [25] propose a privacy framework for policy specification and access control enforcement. The preceding five proposals support privacy by restricting access to information, without addressing privacy aspects such as usage and post-conditions on access.…”
Section: Related Workmentioning
confidence: 99%