The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
d on Dung’s [4] abstract argumentation system • arguments: trees of chained defeasible inferences • aim: determine the status of a query given a belief base • incorporation...