A Comparative Study of Policy Specification Languages for Secure Distributed Applications

V.C.J. Gay, S. Duflos, G. Diaz, E. Horlait

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    7 Citations (Scopus)

    Abstract

    This paper presents a comparative study of policy specification languages. Our objective is to find policy language or notation that is the most suitable to express the security aspects of distributed applications running on policy-based networks. We first made a selection of languages and we compare them on several criteria: their suitability to specify security, their ability to express both user and network oriented security aspects, the representation technique they use and the notions they are able to express. This paper concludes on a discussion on what would be the ideal policy language for distributed applications that have strong security constraints.
    Original languageEnglish
    Title of host publicationManagement Technologies for E-Commerce and E-Business Applications
    Subtitle of host publication13th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2002 Montreal, Canada, October 21–23, 2002, Proceedings
    EditorsMetin Feridun, Peter Kropf, Gilbert Babin
    Place of PublicationBerlin, Heidelberg
    PublisherSpringer
    Pages157-168
    Number of pages12
    ISBN (Electronic)978-3-540-36110-7
    ISBN (Print)978-3-540-00080-8
    DOIs
    Publication statusPublished - 2002
    Event13th IFIP/IEEE International Workshop on Distributed Systems, Operations and Management, DSOM 2002: Management Technologies for E-Commerce and E-Business Applications - Montreal, Canada
    Duration: 21 Oct 200223 Oct 2002
    Conference number: 13

    Workshop

    Workshop13th IFIP/IEEE International Workshop on Distributed Systems, Operations and Management, DSOM 2002
    Abbreviated titleDSOM
    Country/TerritoryCanada
    CityMontreal
    Period21/10/0223/10/02

    Keywords

    • Policy language
    • Policy specification
    • Security specification
    • High level policy
    • Application configuration

    Cite this