Chapter 5 Logic and Inference: Rules
On Comparing the Expressing Power of Access Control Model Frameworks