Login / Signup
Cryptanalysis of a simple key assignment for access control based on polynomial.
Cheng-Chi Lee
Yan-Ming Lai
Chin-Sung Hsiao
Published in:
J. Inf. Secur. Appl. (2013)
Keyphrases
</>
access control
fine grained
security policies
dynamic access control
data security
access control policies
access control models
security requirements
role based access control
role based access control model
databases
security mechanisms
database applications
protection schemes