Quantifying Permissiveness of Access Control Policies.
William EiersGanesh SankaranAlbert LiEmily O'MahonyBenjamin PrinceTevfik BultanPublished in: ICSE (2022)
Keyphrases
- access control policies
- access control
- conflict resolution
- security policies
- access control systems
- distributed environment
- extended logic programs
- fine grained
- trust negotiation
- automated trust negotiation
- sensitive data
- network security
- low cost
- security mechanisms
- information flow
- role based access control
- access control mechanism
- peer to peer
- management system