Login / Signup
A formal approach for the identification of redundant authorization policies in Kubernetes.
Ehtesham Zahoor
Maryam Chaudhary
Sabina Akhtar
Olivier Perrin
Published in:
Comput. Secur. (2023)
Keyphrases
</>
access control policies
role based access control
access control
conflict resolution
formal model
fine grained
databases
case study
multi domain
data sets
information systems
optimal policy
formal representation