Login / Signup
Adapting usage control as a deterrent to address the inadequacies of access controls.
Keshnee Padayachee
Jan H. P. Eloff
Published in:
Comput. Secur. (2009)
Keyphrases
</>
access control
usage control
fine grained
data security
security policies
access control models
access control policies
security mechanisms
role based access control
access control mechanism
database systems
query processing
database design
security requirements
database security
data protection