Dynamic authenticated data structures with access control for outsourcing data stream.
Yi SunXingyuan ChenXuehui DuJian XuPublished in: IET Inf. Secur. (2017)
Keyphrases
- access control
- data structure
- data streams
- dynamic access control
- fine grained
- security policies
- data security
- access control policies
- information systems
- role based access control
- identity management
- security architecture
- access control systems
- access control models
- business process
- security mechanisms
- security model
- outsourced databases
- database security
- role assignment
- discretionary access control
- database management systems
- role based access control model
- security requirements
- conflict resolution