Abstract
Abstract
In the article, we consider a discerning authorization algorithm that eliminates the contradictions in the assignment of access rights to security principals in complex infrastructures, which are using concepts such as group and inheritance. It also can use for the identification of security risks and it ensures that the security risk assessments produce consistent, valid and comparable results.
Subject
General Physics and Astronomy
Reference4 articles.
1. Theory of formal grammars;Gladkii;J. Soviet Mathematics,1974