Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
422520 | Electronic Notes in Theoretical Computer Science | 2007 | 19 Pages |
Abstract
Language-based security approaches to access control and information flow control must at some point rely on a language for expressing policies. However there will in general be several choices for the correct policy language for any given application, and several choices for the implementation of a policy language in a given domain. This article considers an approach to implementing the policy language at the application level, relying on trusted cryptographic libraries whose interface security guarantees are used to verify the correctness of the policy language implementation.
Related Topics
Physical Sciences and Engineering
Computer Science
Computational Theory and Mathematics