Automated Verification Of Role-Based Access Control Policies Constraints Using Prover9.
Khair Eddin SabriPublished in: CoRR (2015)
Keyphrases
- access control policies
- access control
- automated verification
- access control systems
- conflict resolution
- security policies
- model checking
- distributed environment
- trust negotiation
- fine grained
- formal verification
- automated reasoning
- access control models
- role based access control
- theorem prover
- constraint satisfaction
- artificial intelligence
- bayesian networks
- access rights
- sensitive data
- loosely coupled
- web services