Login / Signup
Detecting indirect conflicts between access control policies.
Laura Costa Sarkis
Viviane Torres da Silva
Christiano Braga
Published in:
SAC (2016)
Keyphrases
</>
conflict resolution
access control policies
access control
extended logic programs
access control systems
distributed environment
security policies
fine grained
trust negotiation
data model
role based access control
access requests