Comparing the expressive power of access control models.
Mahesh V. TripunitaraNinghui LiPublished in: CCS (2004)
Keyphrases
- expressive power
- access control models
- access control
- role based access control model
- relational algebra
- query language
- data complexity
- transitive closure
- first order logic
- privacy aware
- computational properties
- database security
- security issues
- machine learning
- relational calculus
- personal information
- role based access control