Figure 4From: Middleware for efficient and confidentiality-aware federation of access control policies Representation of the example policies of Section 3.2 as a policy tree using our policy model. Back to article page