Propagating modifications to mobile policies

1Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Mobile policies provide a flexible framework for enforcing access controls in distributed applications. But what happens when a mobile policy needs to be modified or certain permissions from a policy have to be revoked? Since a mobile policy is attached to the data and travels with the data over the network, it can be tricky to propagate any changes to the policy. In addition, real-world constraints affect the formulation of the problem and imply a variety of propagation algorithms. In this paper, we propose different approaches for propagating modifications to mobile policies consistent with these constraints.

Cite

CITATION STYLE

APA

Smith, K., Faatz, D., Fayad, A., & Jajodia, S. (2002). Propagating modifications to mobile policies. In IFIP Advances in Information and Communication Technology (Vol. 86, pp. 573–584). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-0-387-35586-3_45

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free