Cryptographic Enforcement of Role-Based Access Control.
Jason CramptonPublished in: Formal Aspects in Security and Trust (2010)
Keyphrases
- role based access control
- access control
- discretionary access control
- privacy policies
- smart card
- access control policies
- rbac model
- data security
- fine grained
- multi domain
- security policies
- encryption scheme
- hash functions
- operating system
- security mechanisms
- security requirements
- security model
- access control mechanism
- database systems
- databases
- distributed environment
- social networks