On the Expressive Power of Negated Conditions and Negative Authorizations in Access Control Models.
Padmavathi IyerAmirreza MasoumzadehPaliath NarendranPublished in: Comput. Secur. (2022)
Keyphrases
- expressive power
- access control
- access control models
- query language
- access control policies
- first order logic
- fine grained
- relational algebra
- privacy aware
- transitive closure
- data security
- security policies
- role based access control
- database security
- data management
- personal information
- conflict resolution
- query evaluation
- data model