ls3-www.cs.tu-dortmund.de/cms/medien/publikationen/tr-modautho.pdf
Modular Authorization
the conflict disappears. We give an example in 6.2
6 Examples
In this section we present an excerpt of the rules for the scenario sketched in section 2.
6.1 Security Enforcement
In our scenario we want [...] Definition 6 (object attributes) The ternary predicate
attibute(o, al, av)
holds if the attribute labeled al of object o contains the string av.
University of Dortmund Lehrstuhl Informatik 3
6 technical [...] how conflicts between various authorization policies are solved. Some examples are given in section 6. Conclusions are drawn in section 7, and an outlook on our future work is given.
2 Scenario
In this …