Sign in

Run-time generation, transformation, and verification of access control models for self-protection.

Christopher BaileyLionel MontrieuxRogério de LemosYijun YuMichel Wermelinger
Published in: SEAMS (2014)
Keyphrases
  • access control models
  • access control
  • privacy aware
  • role based access control model
  • database security
  • information security
  • role based access control