Abstract
In the article, we consider a discerning authorization algorithm that eliminates the contradictions in the assignment of access rights to security principals in complex infrastructures, which are using concepts such as group and inheritance. It also can use for the identification of security risks and it ensures that the security risk assessments produce consistent, valid and comparable results.
Export citation and abstract BibTeX RIS
Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.