Login / Signup
An Approach to Formally Validate and Verify the Compliance of Low Level Access Control Policies.
Faouzi Jaïdi
Faten Labbene Ayachi
Published in:
CSE (2014)
Keyphrases
</>
access control policies
low level
access control
conflict resolution
automated trust negotiation
access control systems
high level
security policies
distributed environment
fine grained
extended logic programs
trust negotiation
information systems
security mechanisms
role based access control
sensitive data
loosely coupled
distributed systems
trust evaluation