Goal-directed requirements acquisition
6IWSSD Selected Papers of the Sixth International Workshop on Software Specification and Design
Modern database systems
Role-Based Access Control Models
Computer
The ARBAC97 model for role-based administration of roles
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
AAAI '99/IAAI '99 Proceedings of the sixteenth national conference on Artificial intelligence and the eleventh Innovative applications of artificial intelligence conference innovative applications of artificial intelligence
Flexible support for multiple access control policies
ACM Transactions on Database Systems (TODS)
An algebra for composing access control policies
ACM Transactions on Information and System Security (TISSEC)
The Ponder Policy Specification Language
POLICY '01 Proceedings of the International Workshop on Policies for Distributed Systems and Networks
Access control with IBM Tivoli access manager
ACM Transactions on Information and System Security (TISSEC)
A Policy Language for a Pervasive Computing Environment
POLICY '03 Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks
A Logical Language for Expressing Authorizations
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
An Artificial Intelligence Perspective on Autonomic Computing Policies
POLICY '04 Proceedings of the Fifth IEEE International Workshop on Policies for Distributed Systems and Networks
A Goal-based Approach to Policy Refinement
POLICY '04 Proceedings of the Fifth IEEE International Workshop on Policies for Distributed Systems and Networks
Obligation Policies: An Enforcement Platform
POLICY '05 Proceedings of the Sixth IEEE International Workshop on Policies for Distributed Systems and Networks
CPOL: high-performance policy evaluation
Proceedings of the 12th ACM conference on Computer and communications security
Security analysis in role-based access control
ACM Transactions on Information and System Security (TISSEC)
Policies and conflicts in call control
Computer Networks: The International Journal of Computer and Telecommunications Networking
Administration in role-based access control
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Achieving Self-Management via Utility Functions
IEEE Internet Computing
Dealing with Stable Environmental Conditions in XACML Systems
ICSNC '07 Proceedings of the Second International Conference on Systems and Networks Communications
Xengine: a fast and scalable XACML policy evaluation engine
SIGMETRICS '08 Proceedings of the 2008 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
On the Security of Delegation in Access Control Systems
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Implementing ACL-Based Policies in XACML
ACSAC '08 Proceedings of the 2008 Annual Computer Security Applications Conference
Towards Formal Verification of Role-Based Access Control Policies
IEEE Transactions on Dependable and Secure Computing
An algebra for fine-grained integration of XACML policies
Proceedings of the 14th ACM symposium on Access control models and technologies
Access control policy combining: theory meets practice
Proceedings of the 14th ACM symposium on Access control models and technologies
Policy-Based Event-Driven Services-Oriented Architecture for Cloud Services Operation & Management
CLOUD '09 Proceedings of the 2009 IEEE International Conference on Cloud Computing
XPref: a preference language for P3P
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security
IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
Utility-function-driven energy-efficient cooling in data centers
Proceedings of the 7th international conference on Autonomic computing
Apply measurable risk to strengthen security of a role-based delegation supporting workflow system
POLICY'09 Proceedings of the 10th IEEE international conference on Policies for distributed systems and networks
Relationship-based access control: protection model and policy language
Proceedings of the first ACM conference on Data and application security and privacy
Relationship-based access control policies and their policy languages
Proceedings of the 16th ACM symposium on Access control models and technologies
xfACL: an extensible functional language for access control
Proceedings of the 16th ACM symposium on Access control models and technologies
A Virtualization Assurance Language for Isolation and Deployment
POLICY '11 Proceedings of the 2011 IEEE International Symposium on Policies for Distributed Systems and Networks
Simplifying network administration using policy-based management
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
Policy-driven management is gaining popularity today, mainly due to the ever-growing scale and complexity of large networked systems. In these systems, policies are usually used to simplify the tasks of the system management, thus making way for further system enlargement. Accordingly, a variety of policy languages are proposed to express intentions of administrators in the policy-driven systems, especially for the network and security management. This paper, therefore, investigates current works, discusses the key issues, and then outlines the future work of policy languages.