Service Communautaire d'Information sur la Recherche et le Développement - CORDIS

Security policy verification

The result is an algorithmic technique for policy evaluation in trust- and reputation-based systems, with applications to history based access control. The result exploits techniques from model checking. The potential applications range over a number trust based security systems as part of ubiquitous computing. End-users are designers and programmers of trust based systems, and the main innovative features are the efficiency of the algorithmic techniques, in particular when applied to parameterised policy specifications. It is currently too early to estimate the commercial potential. As a result, no specific steps have been taken at this stage in order to protect any IPR emanating from it.

Reported by

Dept. of Computer Science, University of Aarhus
Aabogade 34
8200 Aarhus N
See on map