Tags

complexity
directed hypergraphs
hypernetworks
NP-completeness
Access control
Authorization
Data leak
Metagraphs
Microservices
Policy verification