Keyphrases
- access control policies
- access control
- conflict resolution
- security policies
- model checking
- distributed environment
- security analysis
- security mechanisms
- access control mechanism
- artificial intelligence
- role based access control
- information flow
- fine grained
- security requirements
- data mining
- databases
- trusted computing
- database