ACCOn: checking consistency of XML write-access control policies.
Loreto BravoJames CheneyIrini FundulakiPublished in: EDBT (2008)
Keyphrases
- access control policies
- conflict resolution
- access control
- access control systems
- xml documents
- security policies
- access control models
- extended logic programs
- distributed environment
- fine grained
- databases
- data exchange
- data model
- metadata
- information flow
- data integration
- security mechanisms
- trust negotiation
- sensitive data
- loosely coupled
- defeasible logic
- information systems
- database