ls3-www.cs.tu-dortmund.de/cms/medien/publikationen/sacmat2001.pdf
Modular Authorization
subset of rules would be evalu- ated once a user wants to access a file Under the Dragon
Slayer system [9] all nodes which store a replica of a file (storage node), and the node where the user resides, collab- [...] (object membership) The binary predicate
in(o1, o2)
holds if object o1 ∈ OT contains o2 ∈ OT .
Definition 9 (direct object membership)
dirin(o1, o2)
holds, if o1 ∈ OT is parent of object o2 ∈ OT
In the Dragon [...] Workshop on Role-Based Access Control (RBAC-00), pages 47–64, Berlin, Ger., July 26–27 2000. ACM Press.
[9] H. F. Wedde, B. Korel, S. Chen, D. C. Daniels, S. Nagaraj, and B. Santhanam. Transparent Access to …