Provisions and Obligations in Policy Management and Security Applications

  title={Provisions and Obligations in Policy Management and Security Applications},
  author={Claudio Bettini and Sushil Jajodia and Xiaoyang Sean Wang and Duminda Wijesekera},
Policies are widely used in many systems and applications. Recently, it has been recognized that a “yes/no” response to every scenario is just not enough for many modern systems and applications. Many policies require certain conditions to be satisfied and actions to be performed before or after a decision is made. To address this need, this paper introduces the notions of provisions and obligations. Provisions are those conditions that need to be satisfied or actions that must be performed… CONTINUE READING
Highly Cited
This paper has 113 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 67 extracted citations

A Formal Implementation of Database Security

View 5 Excerpts
Highly Influenced

Rumpole: An Introspective Break-Glass Access Control Language

ACM Trans. Inf. Syst. Secur. • 2014
View 4 Excerpts
Highly Influenced

Obligations in risk-aware access control

2012 Tenth Annual International Conference on Privacy, Security and Trust • 2012
View 4 Excerpts
Highly Influenced

Risk-Based Privacy-Aware Access Control for Threat Detection Systems

T. Large-Scale Data- and Knowledge-Centered Systems • 2017
View 1 Excerpt

Model-Based Testing of Obligations

2014 14th International Conference on Quality Software • 2014
View 2 Excerpts

113 Citations

Citations per Year
Semantic Scholar estimates that this publication has 113 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 24 references


N. Damianou, N. Dulay, E. Lupu
Sloman The Ponder Policy Specification Language in [18] • 2001
View 1 Excerpt

Provisional Authorizations

E-Commerce Security and Privacy • 2001
View 3 Excerpts


M. Sloman, J. Lobo, E. Lupu
Policies for Distributed Systems and Networks, International Workshop, POLICY 2001 Bristol, UK, January 29-31, 2001, Proceedings, volume 1995 of LNCS. Springer • 2001
View 1 Excerpt

Enforceable security policies

ACM Trans. Inf. Syst. Secur. • 2000
View 1 Excerpt

XML document security based on provisional authorization

ACM Conference on Computer and Communications Security • 2000

Similar Papers

Loading similar papers…