An Approach to Formally Validate and Verify the Compliance of Low Level Access Control Policies.
Faouzi JaïdiFaten Labbene AyachiPublished in: CSE (2014)
Keyphrases
- access control policies
- low level
- access control
- conflict resolution
- automated trust negotiation
- access control systems
- high level
- security policies
- distributed environment
- fine grained
- extended logic programs
- trust negotiation
- information systems
- security mechanisms
- role based access control
- sensitive data
- loosely coupled
- distributed systems
- trust evaluation