Security policies may be used to grant or deny rights related to access to computing resources. Two or more security policies may be compared to determine whether the policies are equivalent, whether one security is more privileged than the other, and the like. In some cases, it may be possible to identify whether sufficient security rights exist to determine that two security policies are not equivalent. Propositional logic can be used in the evaluation of security policies.
展开▼