Login / Signup
From Authorization Logics to Types for Authorization.
Radha Jagadeesan
Published in:
APLAS (2008)
Keyphrases
</>
access control
fine grained
security policies
conflict resolution
security requirements
role based access control
trust management
usage control
digital libraries
trust negotiation
role assignment
artificial intelligence
bayesian networks
expressive power
access control mechanism
access requests