Login / Signup
Shielding RBAC Infrastructures from Cyberterrorism.
András Belokosztolszki
David M. Eyers
Published in:
DBSec (2002)
Keyphrases
</>
access control
role based access control
data management
role based access control model
fine grained
security policies
access control policies
access control models
multiscale
domain specific
security mechanisms
rbac model