Login / Signup
The need for application-aware access control evaluation.
William C. Garrison III
Adam J. Lee
Timothy L. Hinrichs
Published in:
NSPW (2012)
Keyphrases
</>
access control
fine grained
access control mechanism
security policies
dynamic access control
data security
security mechanisms
access control policies
security model
identity management
access control systems
role based access control
relational databases
security architecture
role based access control model