Bernd Blobel wrote: > Dear Bill, dear Sam > > Meanwhile, security constraint modelling succeeds. This concerns policy > modelling, policy negotiation, privilege management, access control, > object security categorisation. Unfortunately, the preparation of EU 6th > Framework proposals was so time comsuming that I had no time to continue > and to distribute the results. The modelling is also part of the EU > modEHRa proposal OIA (Thomas and Sam) will be involved in.
Bernd, I'd not previously studied security constraint modeling but a quick Google put me onto some interesting research. If you have any links to share, I'd appreciate it. Thanks for the new (to me) tack. Best regards, Bill - If you have any questions about using this list, please send a message to d.lloyd at openehr.org

