Online Laboratory Access Control With Zero Trust Approach: Twingate Use Case.
Emmanuel TuyishimeFlorin RaduPetru CotfasDaniel Tudor CotfasTitus BalanAlexandre RekerahoPublished in: ECAI (2024)
Keyphrases
- access control
- access control models
- trust management
- trust relationships
- fine grained
- policy enforcement
- dynamic access control
- data security
- usage control
- role based access control
- role based access control model
- security policies
- identity management
- access control policies
- virtual communities
- security model
- security mechanisms
- database security
- access control mechanism
- rbac model
- security architecture
- privacy aware
- role assignment
- relational databases
- security requirements
- databases