Security policies may be used to allow or deny permissions related to access to computing resources. Two or more security policies may be compared to determine if the policies are equivalent, if one security is more tolerant than another, and so on. In some cases, it may be possible to identify whether there are sufficient security permits to determine that the two security policies are unequal. Propositional logic may be used in security policy evaluation.
展开▼