Login / Signup
Run-time generation, transformation, and verification of access control models for self-protection.
Christopher Bailey
Lionel Montrieux
Rogério de Lemos
Yijun Yu
Michel Wermelinger
Published in:
SEAMS (2014)
Keyphrases
</>
access control models
access control
privacy aware
role based access control model
database security
information security
role based access control