Login / Signup
Implementation of Usage Role-Based Access Control Approach for Logical Security of Information Systems.
Aneta Poniszewska-Maranda
Roksana Rutkowska
Published in:
ICSS (2013)
Keyphrases
</>
role based access control
access control
information systems
data security
rbac model
information security
multi domain
security policies
discretionary access control
security requirements
access control models
general purpose
business processes
data centric