Authorization constraint enforcement for information system security.
Rattikorn HewettPhongphun KijsanayothinPublished in: SMC (2008)
Keyphrases
- access control
- fine grained
- access control policies
- linear constraints
- conflict resolution
- dynamic access control
- data security
- linear programming
- security policies
- constrained minimization
- penalty function
- global constraints
- real time
- constraint satisfaction problems
- evolutionary algorithm
- clustering algorithm
- information retrieval
- data sets