Technological access control interferes with noninfringing scholarship.
Andrew W. AppelEdward W. FeltenPublished in: Commun. ACM (2000)
Keyphrases
- access control
- fine grained
- data security
- dynamic access control
- security policies
- access control policies
- role based access control
- security model
- identity management
- access control models
- security mechanisms
- security architecture
- security requirements
- access control systems
- rbac model
- role based access control model