Security analysis in role-based access control.
Ninghui LiMahesh V. TripunitaraPublished in: ACM Trans. Inf. Syst. Secur. (2006)
Keyphrases
- security analysis
- role based access control
- access control
- access control policies
- security model
- security requirements
- conflict resolution
- public key
- smart card
- security policies
- data security
- multi domain
- fine grained
- encryption scheme
- distributed environment
- privacy policies
- data access
- data mining
- security mechanisms
- distributed systems
- web services