A Framework for the Analysis of Security Technology Vulnerabilities: Defeat Evaluation of an Electronic Access Control Locking System.
Michael CooleDeborah EvansDavid BrooksPublished in: ICCST (2022)
Keyphrases
- access control
- security mechanisms
- data security
- security policies
- policy enforcement
- dynamic access control
- fine grained
- digital rights management
- security architecture
- rbac model
- security requirements
- role based access control
- identity management
- security enforcement
- security model
- access control mechanism
- access control policies
- security issues
- role based access control model
- information security
- protection schemes
- access control systems
- access control models
- role assignment
- directory service
- data protection
- trust relationships
- intrusion detection