ABSTRACT

In Chapter 4, we focused on security mechanisms, which provide the means to enforce security policies. We now turn to security policies themselves, which define what is allowed and what is prohibited.