An End-To-End Approach to Distributed Policy Language Implementation

  • Authors:
  • Tom Chothia;Dominic Duggan;Ye Wu

  • Affiliations:
  • Centrum voor Wiskunde en Informatica (CWI), Kruislaan 413, 1098 SJ, P.O. Box 94079, 1090 GB Amsterdam, The Netherlands;Dept of Computer Science, Stevens Institute of Technology, Hoboken, NJ 07040, USA;Dept of Computer Science, Stevens Institute of Technology, Hoboken, NJ 07040, USA

  • Venue:
  • Electronic Notes in Theoretical Computer Science (ENTCS)
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Language-based security approaches to access control and information flow control must at some point rely on a language for expressing policies. However there will in general be several choices for the correct policy language for any given application, and several choices for the implementation of a policy language in a given domain. This article considers an approach to implementing the policy language at the application level, relying on trusted cryptographic libraries whose interface security guarantees are used to verify the correctness of the policy language implementation.