Sign in

A formal approach for the identification of redundant authorization policies in Kubernetes.

Ehtesham ZahoorMaryam ChaudharySabina AkhtarOlivier Perrin
Published in: Comput. Secur. (2023)
Keyphrases
  • access control policies
  • role based access control
  • access control
  • conflict resolution
  • formal model
  • fine grained
  • databases
  • case study
  • multi domain
  • data sets
  • information systems
  • optimal policy
  • formal representation