Abstract | ||
---|---|---|
Policies are a well-known approach to protecting security and privacy of users as well as for flexible trust management in distributed environments. In the last years a number of policy languages were proposed to address different application scenarios. In order to help both developers and users in choosing the language best suiting her needs, policy language comparisons were proposed in the literature. Nevertheless available comparisons address only a small number of languages, are either out-of-date or too narrow in order to provide a broader picture of the research field. In this paper we consider twelve relevant policy languages and compare them on the strength of ten criteria which should be taken into account in designing every policy language. Some criteria are already known in the literature, others are introduced in our work for the first time. By comparing the choices designers made in addressing such criteria, useful conclusions can be drawn about strong points and weaknesses of each policy language. |
Year | Venue | Keywords |
---|---|---|
2008 | SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY | policy languages,comparison,trust management,privacy,security,review |
Field | DocType | Citations |
Security convergence,Internet privacy,Privacy by Design,Computer science,Computer security,Privacy policy,Computational trust,Security information and event management,Information privacy,Computer security model,Privacy software | Conference | 14 |
PageRank | References | Authors |
0.88 | 15 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Juri Luca De Coi | 1 | 89 | 6.74 |
Daniel Olmedilla | 2 | 662 | 49.51 |