ABSTRACT

In the preceding two chapters, we introduced a modal logic that we will use throughout this book to describe and reason about various aspects of access control. This access-control logic and its collection of inference rules provide a rigorous and formal basis for answering the question “Should this request be granted?”