Bernd Blobel wrote:

> Dear Bill, dear Sam
>
> Meanwhile, security constraint modelling succeeds. This concerns policy
> modelling, policy negotiation, privilege management, access control,
> object security categorisation. Unfortunately, the preparation of EU 6th
> Framework proposals was so time comsuming that I had no time to continue
> and to distribute the results. The modelling is also part of the EU
> modEHRa proposal OIA (Thomas and Sam) will be involved in.

Bernd,

I'd not previously studied security constraint modeling but a quick Google
put me onto some interesting research.  If you have any links to share, I'd
appreciate it.  Thanks for the new (to me) tack.

Best regards,
Bill

-
If you have any questions about using this list,
please send a message to d.lloyd at openehr.org

Reply via email to