Mobile policies provide a flexible framework for enforcing access controls in distributed applications. But what happens when a mobile policy needs to be modified or certain permissions from a policy have to be revoked? Since a mobile policy is attached to the data and travels with the data over the network, it can be tricky to propagate any changes to the policy. In addition, real-world constraints affect the formulation of the problem and imply a variety of propagation algorithms. In this paper, we propose different approaches for propagating modifications to mobile policies consistent with these constraints.
CITATION STYLE
Smith, K., Faatz, D., Fayad, A., & Jajodia, S. (2002). Propagating modifications to mobile policies. In IFIP Advances in Information and Communication Technology (Vol. 86, pp. 573–584). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-0-387-35586-3_45
Mendeley helps you to discover research relevant for your work.