On the Complexity of Authorization in RBAC under Qualification and Security Constraints.
Yuqing SunQihua WangNinghui LiElisa BertinoMikhail J. AtallahPublished in: IEEE Trans. Dependable Secur. Comput. (2011)
Keyphrases
- worst case
- access control
- role based access control
- security policies
- rbac model
- security requirements
- data security
- fine grained
- security mechanisms
- dynamic access control
- access control policies
- access control models
- access control mechanism
- role based access control model
- security model
- database security
- privacy aware
- trust management
- usage control
- role assignment
- computational complexity
- intrusion detection
- access control systems
- network security
- constraint satisfaction
- resource constraints
- statistical databases