Publisher
Springer Berlin Heidelberg
Reference11 articles.
1. Bai, Y., Varadharajan, V.: On transformation of authorization policies. Data and Knowledge Engineering 45(3), 333–357 (2003)
2. Bertino, E., Catania, B., Ferrari, E., Perlasca, P.: A logical framework for reasoning about access control models. ACM Transactions on Information and System Security 6(1), 71–127 (2003)
3. Chomicki, J., Lobo, J., Naqvi, S.: A logical programming approach to conflict resolution in policy management. In: Proceedings of International Conference on Principles of Knowledge Representation and Reasoning, pp. 121–132 (2000)
4. Crampton, J., Khambhammettu, H.: Delegation in role-based access control. International Journal of Information Security 7, 123–136 (2008)
5. Denning, D.E.: A lattice model of secure information flow. Communication of ACM 19, 236–243 (1976)