Abstract
Even though policy enforcement has been studied from different angles including notation, negotiation and enforcement, the development of an application-semantic aware enforcement architecture remains an open problem. In this paper we present and discuss the design of such an architecture.
| Original language | English |
|---|---|
| Title of host publication | Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers |
| Publisher | Springer/Verlag |
| Pages | 26-31 |
| Volume | 5087 |
| ISBN (Electronic) | 978-3-642-04904-0 |
| ISBN (Print) | 978-3-642-04903-3 |
| DOIs | |
| Publication status | Published - 2006 |
| Event | 14th International Security Protocols Workshop - Cambridge, United Kingdom Duration: 27 Mar 2006 → 29 Mar 2006 |
Publication series
| Name | Lecture Notes in Computer Science |
|---|---|
| Publisher | Springer |
| Volume | 5087 |
Workshop
| Workshop | 14th International Security Protocols Workshop |
|---|---|
| Country/Territory | United Kingdom |
| City | Cambridge |
| Period | 27/03/06 → 29/03/06 |
UN SDGs
This output contributes to the following UN Sustainable Development Goals (SDGs)
-
SDG 16 Peace, Justice and Strong Institutions
Fingerprint
Dive into the research topics of 'Towards a Secure Application-Aware Policy Enforcement Architecture'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver