Exploiting Information Relationships for Access Control | IEEE Conference Publication | IEEE Xplore