{"id":"https://openalex.org/W1530514000","doi":"https://doi.org/10.1007/3-540-36110-3_16","title":"A Comparative Study of Policy Specification Languages for Secure Distributed Applications","display_name":"A Comparative Study of Policy Specification Languages for Secure Distributed Applications","publication_year":2002,"publication_date":"2002-01-01","ids":{"openalex":"https://openalex.org/W1530514000","doi":"https://doi.org/10.1007/3-540-36110-3_16","mag":"1530514000"},"language":"en","primary_location":{"id":"doi:10.1007/3-540-36110-3_16","is_oa":true,"landing_page_url":"https://doi.org/10.1007/3-540-36110-3_16","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F3-540-36110-3_16.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://link.springer.com/content/pdf/10.1007%2F3-540-36110-3_16.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048787487","display_name":"Sandrine Duflos","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Sandrine Duflos","raw_affiliation_strings":["LIP6, Universit\u00e9 P. & M. Curie, 8 rue du Capitaine Scott, 75015, Paris, France"],"affiliations":[{"raw_affiliation_string":"LIP6, Universit\u00e9 P. & M. Curie, 8 rue du Capitaine Scott, 75015, Paris, France","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060085602","display_name":"Gladys Diaz","orcid":"https://orcid.org/0000-0002-8216-6922"},"institutions":[{"id":"https://openalex.org/I4210091279","display_name":"Universit\u00e9 Sorbonne Paris Nord","ror":"https://ror.org/0199hds37","country_code":"FR","type":"education","lineage":["https://openalex.org/I4210091279"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Gladys Diaz","raw_affiliation_strings":["L2TI, Universit\u00e9 Paris 13, 99 Av. J.-B. Cl\u00e9ment, 93430, Villetaneuse, France"],"affiliations":[{"raw_affiliation_string":"L2TI, Universit\u00e9 Paris 13, 99 Av. J.-B. Cl\u00e9ment, 93430, Villetaneuse, France","institution_ids":["https://openalex.org/I4210091279"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052499151","display_name":"Val\u00e9rie Gay","orcid":"https://orcid.org/0000-0002-4301-1995"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Val\u00e9rie Gay","raw_affiliation_strings":["LIP6, Universit\u00e9 P. & M. Curie, 8 rue du Capitaine Scott, 75015, Paris, France"],"affiliations":[{"raw_affiliation_string":"LIP6, Universit\u00e9 P. & M. Curie, 8 rue du Capitaine Scott, 75015, Paris, France","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085486467","display_name":"\u00c9ric Horlait","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Eric Horlait","raw_affiliation_strings":["LIP6, Universit\u00e9 P. & M. Curie, 8 rue du Capitaine Scott, 75015, Paris, France"],"affiliations":[{"raw_affiliation_string":"LIP6, Universit\u00e9 P. & M. Curie, 8 rue du Capitaine Scott, 75015, Paris, France","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5048787487"],"corresponding_institution_ids":[],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":9.4901,"has_fulltext":true,"cited_by_count":12,"citation_normalized_percentile":{"value":0.97617749,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"157","last_page":"168"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/notation","display_name":"Notation","score":0.7664567232131958},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7629417181015015},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.6918597221374512},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.5533263683319092},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.5277391672134399},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.48041510581970215},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.4758583903312683},{"id":"https://openalex.org/keywords/ideal","display_name":"Ideal (ethics)","score":0.4697924852371216},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.413108766078949},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.39478302001953125},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3761255145072937},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3734528720378876},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.17466968297958374},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.15121987462043762},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.14906832575798035},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10324114561080933},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.09268757700920105},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.08730447292327881}],"concepts":[{"id":"https://openalex.org/C45357846","wikidata":"https://www.wikidata.org/wiki/Q2001982","display_name":"Notation","level":2,"score":0.7664567232131958},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7629417181015015},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.6918597221374512},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.5533263683319092},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.5277391672134399},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.48041510581970215},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.4758583903312683},{"id":"https://openalex.org/C2776639384","wikidata":"https://www.wikidata.org/wiki/Q840396","display_name":"Ideal (ethics)","level":2,"score":0.4697924852371216},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.413108766078949},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.39478302001953125},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3761255145072937},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3734528720378876},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.17466968297958374},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.15121987462043762},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.14906832575798035},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10324114561080933},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.09268757700920105},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.08730447292327881},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0}],"mesh":[],"locations_count":6,"locations":[{"id":"doi:10.1007/3-540-36110-3_16","is_oa":true,"landing_page_url":"https://doi.org/10.1007/3-540-36110-3_16","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F3-540-36110-3_16.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:ris.utwente.nl:openaire_cris_publications/2d485e0a-b144-462e-8035-e95b0cd1ae7f","is_oa":false,"landing_page_url":"https://research.utwente.nl/en/publications/2d485e0a-b144-462e-8035-e95b0cd1ae7f","pdf_url":null,"source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Gay, V C J, Duflos, S, Diaz, G & Horlait, E 2002, A Comparative Study of Policy Specification Languages for Secure Distributed Applications. in M Feridun, P Kropf & G Babin (eds), Management Technologies for E-Commerce and E-Business Applications : 13th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2002 Montreal, Canada, October 21\u201323, 2002, Proceedings. Springer, Berlin, Heidelberg, pp. 157-168, 13th IFIP/IEEE International Workshop on Distributed Systems, Operations and Management, DSOM 2002, Montreal, Canada, 21/10/02. https://doi.org/10.1007/3-540-36110-3_16","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:HAL:hal-01544924v1","is_oa":false,"landing_page_url":"https://hal.science/hal-01544924","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"DSOM 2002 - 13th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, Oct 2002, Montreal, Canada. pp.157-168, &#x27E8;10.1007/3-540-36110-3_16&#x27E9;","raw_type":"Conference papers"},{"id":"pmh:oai:opus.lib.uts.edu.au:10453/9588","is_oa":false,"landing_page_url":"http://hdl.handle.net/10453/9588","pdf_url":null,"source":{"id":"https://openalex.org/S4306401357","display_name":"UTS ePRESS (University of Technology Sydney)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I114017466","host_organization_name":"University of Technology Sydney","host_organization_lineage":["https://openalex.org/I114017466"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"},{"id":"pmh:oai:ris.utwente.nl:publications/2d485e0a-b144-462e-8035-e95b0cd1ae7f","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:ut:oai:ris.utwente.nl:publications/6d768fb2-5a93-4b29-9fa7-bdd5bfdd4c2b","is_oa":false,"landing_page_url":"https://research.utwente.nl/experts/en/publications/6d768fb2-5a93-4b29-9fa7-bdd5bfdd4c2b","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"13th IFIP/IEEE International Workshop on Distributed Systems, Operations and Management, DSOM 2002","raw_type":"info:eu-repo/semantics/conferencepaper"}],"best_oa_location":{"id":"doi:10.1007/3-540-36110-3_16","is_oa":true,"landing_page_url":"https://doi.org/10.1007/3-540-36110-3_16","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F3-540-36110-3_16.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[{"score":0.4300000071525574,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W1530514000.pdf","grobid_xml":"https://content.openalex.org/works/W1530514000.grobid-xml"},"referenced_works_count":30,"referenced_works":["https://openalex.org/W1462190747","https://openalex.org/W1485146060","https://openalex.org/W1536095764","https://openalex.org/W1550884769","https://openalex.org/W1556524282","https://openalex.org/W1566793751","https://openalex.org/W1567498567","https://openalex.org/W1640327256","https://openalex.org/W1879423806","https://openalex.org/W1907367130","https://openalex.org/W2006349570","https://openalex.org/W2041908271","https://openalex.org/W2047388411","https://openalex.org/W2097454402","https://openalex.org/W2105614320","https://openalex.org/W2107424400","https://openalex.org/W2115075004","https://openalex.org/W2120563715","https://openalex.org/W2135665381","https://openalex.org/W2144794336","https://openalex.org/W2147872058","https://openalex.org/W2150829263","https://openalex.org/W2150908257","https://openalex.org/W2159637106","https://openalex.org/W2162862019","https://openalex.org/W2168366509","https://openalex.org/W2997410562","https://openalex.org/W4242457209","https://openalex.org/W4285719527","https://openalex.org/W6682480633"],"related_works":["https://openalex.org/W2188814192","https://openalex.org/W1519114293","https://openalex.org/W2151761340","https://openalex.org/W2087536126","https://openalex.org/W2111277540","https://openalex.org/W3094039898","https://openalex.org/W2173238669","https://openalex.org/W2130339907","https://openalex.org/W2375663084","https://openalex.org/W2114705216"],"abstract_inverted_index":null,"counts_by_year":[{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
