We demonstrate how access control models and policies can be represented by using term rewriting systems, and how rewriting may be used for evaluating access requests and for provi...
Purpose – Security information management systems (SIMs) have been providing a unified distributed platform for the efficient management of security information produced by co...