Login / Signup
A theory for comparing the expressive power of access control models.
Mahesh V. Tripunitara
Ninghui Li
Published in:
J. Comput. Secur. (2007)
Keyphrases
</>
expressive power
query language
access control models
first order logic
data complexity
access control
computational properties
relational algebra
transitive closure
privacy aware
database security
data mining
relational calculus