Article ID Journal Published Year Pages File Type
10330787 Information and Computation 2011 20 Pages PDF
Abstract
These results show that, for sufficiently complex access control languages, certain forms of analysis are very difficult or even impossible, limiting the ability to verify documents, audit existing policies, and evaluate new policies. Thus rule-based access control policies based on XPath are, in some sense, too powerful, demonstrating the need for a model of access control of tree updates that bridges the gap between expressive and analyzable policies.
Related Topics
Physical Sciences and Engineering Computer Science Computational Theory and Mathematics
Authors
,