Inconsistency detection method for access control policies.
Riaz Ahmed ShaikhKamel AdiLuigi LogrippoSerge MankovskiPublished in: IAS (2010)
Keyphrases
- detection method
- access control policies
- access control
- conflict resolution
- security policies
- distributed environment
- access control systems
- face detection
- detection algorithm
- extended logic programs
- security mechanisms
- fine grained
- trust negotiation
- security requirements
- region detection
- automated trust negotiation
- database
- loosely coupled
- answer sets
- video sequences
- database systems
- computer vision