Sun, Yuqing; Gong, Bin; Meng, Xiangxu; Lin, Zongkai; … - 2009
enforce flexible security policies for their information systems. Although the area of access control has been widely … typically characterize the various attributes of the requesting parties and transactions and reflect the access control criteria …