How to Leverage Access Control Specification for Autonomic Policy Management.
Ranga Raju VatsavaiSharma ChakravarthyMukesh K. MohaniaPublished in: ICAC (2005)
Keyphrases
- access control
- rbac model
- policy enforcement
- access control policies
- role based access control
- fine grained
- role based access control model
- multi domain
- service platform
- dynamic access control
- data security
- identity management
- security policies
- xml access control
- high assurance
- conflict resolution
- security model
- access control systems
- access control models
- domain specific
- security mechanisms
- role assignment
- access control mechanism
- database
- management system
- cross domain
- data management
- information management
- security management
- directory service
- database security
- security requirements