ABSTRACT

A large number of access and privilege processes have been documented. Many of these are complex and bewildering. e initial desire to make access and privilege responsive to changes in the enterprise in an automated manner drove our choices [17,18].