By carrying out the task of comparing a consid-
erable amount of policy languages, we came to be-
lieve that they may be classified in two big groups
collecting, so to say, standard-oriented and research-
oriented languages respectively. EPAL, WSPL and
XACML can be considered standard-oriented lan-
guages since they provide a well-defined but restricted
set of features: standard-oriented languages are hence
a good choice for users who do not need advanced
features but for whom compatibility with standards is
a foremost issue. Ponder, RT and TPL are somehow
placed in between: on the one hand Ponder provides a
complete authorization solution, which however takes
place after a previously overcome authentication step,
therefore Ponder cannot be applied to contexts (like
pervasive environments) were users cannot be accu-
rately identified; on the other hand RT and TPL do
not provide a complete authorization solution, since
they can only map requesters to roles and need to rely
on some external component to perform the actual
authentication. Finally research-oriented languages
strive toward generality and extensibility and provide
a number of more advanced features in comparison
with standard-oriented languages (e.g., conflict har-
monization in KAoS and Rei, negotiations in Cas-
sandra, PeerTrust and PSPL or explanations in Pro-
tune); they should be hence the preferred choice for
users who do not mind about standardization issues
but require the advanced functionalities that research-
oriented languages provide.
7 CONCLUSIONS
Policies are a well-known approach to protecting se-
curity and privacy of users as well as for flexible trust
management in distributed environments. In the last
years a number of policy languages were proposed to
address different application scenarios. In order to
help both developers and users in choosing the lan-
guage best suiting her needs, policy language com-
parisons were proposed in the literature. Nevertheless
available comparisons address only a small number of
languages, are either out-of-date or too narrow in or-
der to provide a broader picture of the research field.
In this paper we considered twelve relevantpolicy lan-
guages and compared them on the strength of eleven
criteria which should be taken into account in design-
ing every policy language.
By comparing the choices designers made in ad-
dressing such criteria, useful conclusions can be
drawn about strong points and weaknesses of each
policy language.
REFERENCES
Anderson, A. H. (2004). An introduction to the web ser-
vices policy language (wspl). In POLICY 2004. IEEE
Computer Society.
Anderson, A. H. (2006). A comparison of two privacy pol-
icy languages: Epal and xacml. In SWS 2004. ACM
Press.
Ashley, P., Hada, S., Karjoth, G., Powers, C., and Schunter,
M. (2003). Enterprise privacy authorization language
(epal 1.2). Technical report.
Becker, M. Y. and Sewell, P. (2004). Cassandra: Distributed
access control policies with tunable expressiveness. In
POLICY 2004. IEEE Computer Society.
Bonatti, P., Olmedilla, D., and Peer, J. (2006). Advanced
policy explanations. In ECAI 2006. IOS Press.
Bonatti, P. and Samarati, P. (2000). Regulating service ac-
cess and information release on the web. In CCS 2000.
ACM Press.
Damianou, N., Dulay, N., Lupu, E., and Sloman, M. (2001).
The ponder policy specification language. In POLICY
2001. Springer.
Duma, C., Herzog, A., and Shahmehri, N. (2007). Privacy
in the semantic web: What policy languages have to
offer. In POLICY 2007. IEEE Computer Society.
Gavriloaie, R., Nejdl, W., Olmedilla, D., Seamons, K. E.,
and Winslett, M. (2004). No registration needed: How
to use declarative policies and negotiation to access
sensitive resources on the semantic web. In ESWS
2004. Springer.
Herzberg, A., Mass, Y., Michaeli, J., Ravid, Y., and Naor,
D. (2000). Access control meets public key infrastruc-
ture, or: Assigning roles to strangers. In 2000 IEEE
Symposium on Security and Privacy. IEEE Computer
Society.
Kagal, L., Finin, T. W., and Joshi, A. (2003). A policy
language for a pervasive computing environment. In
POLICY 2003. IEEE Computer Society.
Li, N. and Mitchell, J. C. (2003). Rt: A role-based trust-
management framework. In DISCEX III. IEEE Com-
puter Society.
Lorch, M., Proctor, S., Lepro, R., Kafura, D., and Shah, S.
(2003). First experiences using xacml for access con-
trol in distributed systems. In XMLSEC 2003. ACM
Press.
Seamons, K. E., Winslett, M., Yu, T., Smith, B., Child, E.,
Jacobson, J., Mills, H., and Yu, L. (2002). Require-
ments for policy languages for trust negotiation. In
POLICY 2002. IEEE Computer Society.
Tonti, G., Bradshaw, J. M., Jeffers, R., Montanari, R., Suri,
N., and Uszok, A. (2003). Semantic web languages for
policy representation and reasoning: A comparison of
kaos, rei, and ponder. In ISWC 2003. Springer.
Uszok, A., Bradshaw, J. M., Jeffers, R., Suri, N., Hayes,
P. J., Breedy, M. R., Bunch, L., Johnson, M., Kulka-
rni, S., and Lott, J. (2003). Kaos policy and domain
services: Toward a description-logic approach to pol-
icy representation, deconfliction, and enforcement. In
POLICY 2003. IEEE Computer Society.
SECRYPT 2008 - International Conference on Security and Cryptography
490