An End-To-End Approach to Distributed Policy Language Implementation (Extended Abstract)

被引:0
|
作者
Chothia, Tom [1 ]
Duggan, Dominic [2 ]
Wu, Ye [2 ]
机构
[1] CWI, Kruislaan 413,1098 SJ POB 94079, NL-1090 GB Amsterdam, Netherlands
[2] Stevens Inst Technol, Dept Comp Sci, Hoboken, NJ 07040 USA
关键词
Access control; policy language; cryptographic libraries; abstract data types;
D O I
10.1016/j.entcs.2007.03.010
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Language-based security approaches to access control and information flow control must at some point rely on a language for expressing policies. However there will in general be several choices for the correct policy language for any given application, and several choices for the implementation of a policy language in a given domain. This article considers an approach to implementing the policy language at the application level, relying on trusted cryptographic libraries whose interface security guarantees are used to verify the correctness of the policy language implementation.
引用
收藏
页码:3 / 21
页数:19
相关论文
共 50 条
  • [1] A distributed approach to end-to-end network topology inference
    Jin, Xing
    Xia, Qiuyan
    Chan, S. -H. Gary
    2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1704 - 1709
  • [2] Distributed Photovoltaic Installation Admittance Optimization: An End-to-End Approach
    Yu, Xiao
    Zhao, Jian
    Wang, Xiaoyu
    Zhang, Haipeng
    Li, Jiayong
    Xu, Zhao
    IEEE TRANSACTIONS ON SMART GRID, 2023, 14 (06) : 4942 - 4952
  • [3] Distributed End-to-End testing management
    Bai, XY
    Tsai, WT
    Paul, R
    Shen, TC
    Li, B
    FIFTH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE, PROCEEDINGS, 2001, : 140 - 151
  • [4] End-to-end Distributed Video Coding
    Zhou, Junwei
    Lv, Ting
    Yi, XiangBo
    DCC 2022: 2022 DATA COMPRESSION CONFERENCE (DCC), 2022, : 496 - 496
  • [5] GIG End-to-End Policy Based Network Management: A New Approach to Large-Scale Distributed Automation
    Davidson, Steven A.
    Wang, Mu-Cheng
    Mohan, Sam
    Bronzo, Frank
    Zinky, John
    Burchfiel, Jerry
    2011 - MILCOM 2011 MILITARY COMMUNICATIONS CONFERENCE, 2011, : 2011 - 2018
  • [6] Implementation of End-to-end connection of SAN
    Zhang Xin-Ying
    Tu Xiao-Dong
    2010 INTERNATIONAL CONFERENCE ON THE DEVELOPMENT OF EDUCATIONAL SCIENCE AND COMPUTER TECHNOLOGY, 2010, : 185 - 187
  • [7] EXTENDED TRACHEAL RESECTION WITH END-TO-END ANASTOMOSIS
    GAZZANIGA, AB
    RAPPAPORT, I
    STEMMER, EA
    ARCHIVES OF SURGERY, 1971, 102 (06) : 589 - +
  • [8] DeepHash: An End-to-End Learning Approach for Metadata Management in Distributed File Systems
    Gao, Yuanning
    Gao, Xiaofeng
    Chen, Guihai
    PROCEEDINGS OF THE 48TH INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING (ICPP 2019), 2019,
  • [9] SECURE END-TO-END DELEGATIONS IN DISTRIBUTED SYSTEMS
    HARDJONO, T
    OHTA, T
    COMPUTER COMMUNICATIONS, 1994, 17 (03) : 230 - 238
  • [10] Distributed end-to-end QoS contract negotiation
    Pouyllau, Helia
    Haar, Stefan
    INTER-DOMAIN MANAGEMENT, PROCEEDINGS, 2007, 4543 : 180 - +