Login / Signup
On the Construction and Verification of Self-modifying Access Control Policies.
David J. Power
Mark Slaymaker
Andrew C. Simpson
Published in:
Secure Data Management (2009)
Keyphrases
</>
access control policies
access control
conflict resolution
security policies
access control systems
distributed environment
extended logic programs
fine grained
model checking
data mining
trust negotiation
information systems
loosely coupled
automated trust negotiation