An End-To-End Approach to Distributed Policy Language Implementation. (Extended Abstract)

Tom Chothia, Dominic Duggan, Ye Wu

Research output: Contribution to journalArticlepeer-review

Abstract

Language-based security approaches to access control and information flow control must at some point rely on a language for expressing policies. However there will in general be several choices for the correct policy language for any given application, and several choices for the implementation of a policy language in a given domain. This article considers an approach to implementing the policy language at the application level, relying on trusted cryptographic libraries whose interface security guarantees are used to verify the correctness of the policy language implementation.

Original languageEnglish
Pages (from-to)3-21
Number of pages19
JournalElectronic Notes in Theoretical Computer Science
Volume171
Issue number4
DOIs
StatePublished - 10 Jul 2007

Keywords

  • Access control
  • abstract data types
  • cryptographic libraries
  • policy language

Fingerprint

Dive into the research topics of 'An End-To-End Approach to Distributed Policy Language Implementation. (Extended Abstract)'. Together they form a unique fingerprint.

Cite this