ABSTRACT

In the previous chapter, we introduced a language for describing access-control scenarios. We presented the syntax for well-formed statements in the language (i.e., formulas). We also specified their semantics through the use of Kripke structures.