Analyzing consistency of security policies
- 22 November 2002
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
No abstract availableThis publication has 8 references indexed in Scilit:
- Specifying a security policy: a case studyPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Supporting multiple access control policies in database systemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Combining components and policiesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Extending the schematic protection model. I. Conditional tickets and authenticationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A decision support system for bureaucratic policy administration: An abductive logic programming approachDecision Support Systems, 1996
- Solving normative conflicts by merging rolesPublished by Association for Computing Machinery (ACM) ,1995
- A calculus for access control in distributed systemsACM Transactions on Programming Languages and Systems, 1993
- Modal LogicPublished by Cambridge University Press (CUP) ,1980