2001
DOI: 10.1007/3-540-44569-2_2
|View full text |Cite
|
Sign up to set email alerts
|

The Ponder Policy Specification Language

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
594
0
14

Year Published

2002
2002
2019
2019

Publication Types

Select...
4
3
3

Relationship

1
9

Authors

Journals

citations
Cited by 883 publications
(633 citation statements)
references
References 10 publications
2
594
0
14
Order By: Relevance
“…In addition to the already mentioned P3P and APPEL languages, several other machine-readable policy languages for privacy policies and preferences have been proposed. Examples are Ponder [8], which is a language for specifying management and security policies for distributed systems, and Rei [17], which is designed and distributed for dynamic environments like pervasive systems. Duma et al [10] provide a comparison and review of a selection of the proposed policy languages with respect to privacy.…”
Section: Personal Data Managementmentioning
confidence: 99%
“…In addition to the already mentioned P3P and APPEL languages, several other machine-readable policy languages for privacy policies and preferences have been proposed. Examples are Ponder [8], which is a language for specifying management and security policies for distributed systems, and Rei [17], which is designed and distributed for dynamic environments like pervasive systems. Duma et al [10] provide a comparison and review of a selection of the proposed policy languages with respect to privacy.…”
Section: Personal Data Managementmentioning
confidence: 99%
“…Most of the current trust management frameworks are aimed at authentication or access control, whereas we are aiming at a more abstract form of trust specification which can then be analysed and evaluated, although it may be used as the basis for generating access control and authentication policies. We eventually hope to use SULTAN trust specifications as a starting point for deriving Ponder security management policies (Damianou et al, 1995) for authorisation and authentication or to make trust-based authorisation decisions.…”
Section: Motivationmentioning
confidence: 99%
“…Binding strategies are all defined as policy rules externally to the proxy code; policies can be specified even at run-time with no intervention on the proxy code and are evaluated on the basis of dynamic operating conditions. SCaLaDE expresses the binding strategies in the Ponder language, which permits the specification of several types of management policies for distributed systems and networks [15]. For instance, Ponder includes authorization policies for access control, obligation policies for proactive management, and organizational policies used to structure responsibility based on organizational models, e.g., role policies.…”
Section: The Scalade Policy Middlewarementioning
confidence: 99%