Return to Article Details Analysis of formal models for access control and specific features of their applicability to databases Download Download PDF