TY - JOUR
T1 - An End-To-End Approach to Distributed Policy Language Implementation. (Extended Abstract)
AU - Chothia, Tom
AU - Duggan, Dominic
AU - Wu, Ye
PY - 2007/7/10
Y1 - 2007/7/10
N2 - Language-based security approaches to access control and information flow control must at some point rely on a language for expressing policies. However there will in general be several choices for the correct policy language for any given application, and several choices for the implementation of a policy language in a given domain. This article considers an approach to implementing the policy language at the application level, relying on trusted cryptographic libraries whose interface security guarantees are used to verify the correctness of the policy language implementation.
AB - Language-based security approaches to access control and information flow control must at some point rely on a language for expressing policies. However there will in general be several choices for the correct policy language for any given application, and several choices for the implementation of a policy language in a given domain. This article considers an approach to implementing the policy language at the application level, relying on trusted cryptographic libraries whose interface security guarantees are used to verify the correctness of the policy language implementation.
KW - Access control
KW - abstract data types
KW - cryptographic libraries
KW - policy language
UR - http://www.scopus.com/inward/record.url?scp=34250873258&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=34250873258&partnerID=8YFLogxK
U2 - 10.1016/j.entcs.2007.03.010
DO - 10.1016/j.entcs.2007.03.010
M3 - Article
AN - SCOPUS:34250873258
SN - 1571-0661
VL - 171
SP - 3
EP - 21
JO - Electronic Notes in Theoretical Computer Science
JF - Electronic Notes in Theoretical Computer Science
IS - 4
ER -