ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
65
views
9
references
Top references
cited by
33
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,682
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Policies for Distributed Systems and Networks
The Ponder Policy Specification Language
other
Author(s):
Nicodemos Damianou
,
Naranker Dulay
,
Emil Lupu
,
Morris Sloman
Publication date
(Online):
February 8 2001
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Policy Perspectives
Most cited references
9
Record
: found
Abstract
: not found
Article
: not found
Role-based access control models
R.S. Sandhu
,
E.J. Coyne
,
H.L. Feinstein
…
(1996)
0
comments
Cited
230
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Access control: principle and practice
P. Samarati
,
R.S. Sandhu
(1994)
0
comments
Cited
70
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
A Comparison of Commercial and Military Computer Security Policies
David D. Clark
,
David R. Wilson
(1987)
0
comments
Cited
34
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2001
Publication date (Online):
February 8 2001
Pages
: 18-38
DOI:
10.1007/3-540-44569-2_2
SO-VID:
1b09db92-9ae1-4d62-8115-69db81da5e99
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 18
The Ponder Policy Specification Language
pp. 39
IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution
Similar content
3,682
Cystic Lesions of the Jaws: The Top 10 Differential Diagnoses to Ponder.
Authors:
Anne C. McLean
,
Pablo A. Vargas
Reference percentiles for tri‐ponderal mass index and its association with general and abdominal obesity among Iranian children and adolescents: A report from the SHED LIGHT study
Authors:
Avisa Tabib
,
Niloufar Samiei
,
Alireza A. Ghavidel
…
Desempenho ponderal de novilhas mestiças Holandês × Zebu submetidas a duas estratégias de suplementação mineral
Authors:
Felipe Nogueira Domingues
,
José Fernando Coelho da Silva
,
Hernan Vasquez
…
See all similar
Cited by
33
A survey of trust in internet applications
Authors:
Morri Sloman
,
Tyrone Grandison
Trust Management Survey
Authors:
Sini Ruohomaa
,
Lea Kutvonen
Semantic Web Languages for Policy Representation and Reasoning: A Comparison of KAoS, Rei, and Ponder
Authors:
Gianluca Tonti
,
Jeffrey Bradshaw
,
Renia Jeffers
…
See all cited by