“…There is a long line of works on the safety analysis of access control policies that started with the seminal paper [17]. To the best of our knowledge, Li and Tripunitara [23] were the first to introduce security analysis in the context of ARBAC, followed by many papers, e.g., [21,3,38,24,39,6,1,7,18,15,31,28,44,10]. The idea underlying such works is to reduce safety analysis to graph manipulation [21,3,38] or fix-point computation performed either by Logic Programming (as in [24]) or model checking (as in [39,6,1,7,18,15,31,28,44]).…”