|
Related Links Logics and Languages
Overview Henry M. Gladney and Jeff B. Lotspiech, "Safeguarding Digital Library Contents and Users, Storing, Sending, Showing, and Honoring Usage Terms and Conditions", D-Lib Magazine, May 1998 Sandra Payette and Carl Lagoze, "Policy-Enforcing, Policy-Carrying Digital Objects", Fourth European Conference on Research and Advanced Technology for Digital Libraries, Springer 2000
Various Logics/Languages
Complete
Obligation R. van der Meyden, "The Dynamic Logic of Permission" IEEE Symposium on Logic in Computer Science, Philadelphia, 1990
Consistency Frederic Cuppens, Laurence Cholvy, Claire Saurel, and Jerome Carrere, "Merging security policies: analysis of a practical example" PCSFW: Proceedings of The 11th Computer Security Foundations Workshop, 1998 J. Chomicki and J. Lobo, "Monitors for History-Based Policies" Proc. International Workshop of Policies for Distributed Systems and Networks, Policy 2001. LNCS 1995. January 2001
Addresses implementation D. Wijesekera, S. Jajodia. "Policy Algebras for Access Control -- The Propositional Case" Proc. of the ACM Conference on Computer and Communications Security, November 5-8, 2001 Nicodemos Damianou, Naranker Dulay, Emil Lupu, and Morris Sloman, "The Ponder Policy Specification Language", Proc. International Workshop of Policies for Distributed Systems and Networks, Policy 2001. LNCS 1995. January 2001 Fred B. Schneider, "Enforceable Security Policies." July 26, 1999 James A. Hoagland, Raju Pandey, and Karl N. Levitt, "Security Policy Specification Using a Graphical Approach", 1998
Delegation Ninghui Li, Benjamin N. Grosof, and Joan Feigenbaum, "A Practically Implementable and Tractable Delegation Logic" Proceedings of the 21st IEEE Symposium on Security and Privacy, IEEE Computer Society Press, May 2000, Oakland CA. Ninghui LI, Benjamin Grosof, and Joan Feigenbaum, "A Nonmonotonic Delegation Logic with Prioritized Conflict Handling"
PolicyMaker/KeyNote Minna Kangasluoma, ""Policy Specification Languages", Nov. 11, 1999
XML
Individual languages Robin Cover "The XML Cover Pages: Digital Property Right's Language (DPRL)" June 20, 2001 "The Open Digital Rights Langauge Initiative" Amir Herzberg, Yosi Mass, Joris Michaeli, Dalit Naor, and Yiftach Ravid, "Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers"
SPKI/SDSI Joseph Y. Halpern and Ron van der Meyden, "A Logic for SDSI's Linked Local Name Spaces" Journal of Computer Security, vol 9, number 1, 2, pp.75-104, 2001 Jon Howell and David Kotz, "A Formal Semantics for SPKI" Proc. of the Sixth European Symposium on Research in Computer Security, 2000, Lecture Notes in Computer Science #1895, pages 140-158 Dwaine Clarke, Jean-Emile Elien, Carl Ellison , Matt Fredette, Alexander Morcos, and Ronald L. Rivest, "Certificate Chain Discovery in SPKI/SDSI" manuscript, Nov. 1999 (to appear in Journal of Computer Security)
Framework for comparing approaches
Sample Policies William Yeo Arms, "Implementing Policies for Access Management" D-Lib Magazine, Feb 1998
Medical
Various Questions concerning this project should be sent to Vicky Weissman.
|