Towards more pro-active access control in computer systems and networks.
Yixuan ZhangJingsha HeBin ZhaoZhiqing HuangRuohong LiuPublished in: Comput. Secur. (2015)
Keyphrases
- access control
- computer systems
- computer networks
- fine grained
- data processing
- dynamic access control
- data security
- operating system
- computing systems
- information systems
- security policies
- role based access control
- computer security
- communication systems
- access control policies
- information processing systems
- role based access control model
- security mechanisms
- access control models
- security requirements
- security model
- access control systems
- rbac model
- data analysis
- identity management
- intrusion detection system
- database management systems
- databases