A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2005; you can also visit the original URL.
The file type is application/pdf
.
A Perspective on Graphs and Access Control Models
[chapter]
2004
Lecture Notes in Computer Science
There would seem to be a natural connection between graphs and information security. This is particularly so in the arena of access control and authorization. Research on applying graph theory to access control problems goes back almost three decades. Nevertheless it is yet to make its way into the mainstream of access control research and practice. Much of this prior research is based on first principles, although more recently there have been significant efforts to build upon existing graph
doi:10.1007/978-3-540-30203-2_2
fatcat:424fncklwfhhrl4dpvhv6zxaxq