Typing access control and secure information flow in sessions.
Sara CapecchiIlaria CastellaniMariangiola Dezani-CiancagliniPublished in: Inf. Comput. (2014)
Keyphrases
- information flow
- access control
- data security
- security mechanisms
- security requirements
- identity management
- access control mechanism
- security architecture
- unauthorized access
- security model
- rbac model
- xml access control
- security policies
- access control policies
- dynamic access control
- information security
- role based access control
- access control models
- digital rights management
- data protection
- social networks
- security issues
- security analysis
- communication networks
- authentication and access control
- rights management
- supply chain
- access control systems
- xml databases
- information systems