Login / Signup
Building access control models with attribute exploration.
Sergei A. Obiedkov
Derrick G. Kourie
Jan H. P. Eloff
Published in:
Comput. Secur. (2009)
Keyphrases
</>
access control models
access control
role based access control model
privacy aware
database security
fine grained
data mining
security issues