2
$\begingroup$

I've been reading the following papers in access control.

http://faculty.nps.edu/dedennin/publications/lattice76.pdf

http://www.winlab.rutgers.edu/~trappe/Courses/AdvSec05/access_control_lattice.pdf

The papers ultimately try to reduce the access control mechanisms to lattice based access control. But I do not understand why reducing to lattice model is so important.

Can anyone comment?

1 Answers 1