|
|
|
|
Means to describe certificates,
security policies, delegation, ... |
|
Linking info with its pedigree,
trusting pedigree? |
|
Security and DAML-S |
|
devices, ubiquitous computing, web
services |
|
Reasoning about security |
|
Enforcing security policies |
|
Identify the value added by DAML
security |
|
vs “security in existing systems” |
|
Security for COTS products |
|
|
|
|
|
|
|
|
Security mark-up of documents to
support decisions: |
|
Which (part of) document/service is
accessible to whom? |
|
How can this document being transported
(secure channel, bandwith, etc)? |
|
Reasoning about security |
|
What can a device do/not do? |
|
Can I trust the results of the
computing system? |
|
Basis for enforcing security
requirements and policies |
|
Clarity of representation of security
requirements |
|
Enables negotiation, supports decision
making and conflict resolution, support an agent in retrieving the “right”
items |