Back to Results
First PageMeta Content
Computer security / Security / Access control / Computer access control / XACML / Binary decision diagram / PERMIS / Information flow / Role-based access control / Policy analysis / Security-Enhanced Linux / Model checking


Verification and Change-Impact Analysis of Access-Control Policies∗ Kathi Fisler Shriram Krishnamurthi
Add to Reading List

Document Date: 2005-04-29 09:42:28


Open Document

File Size: 174,80 KB

Share Result on Facebook