Login / Signup

Building access control models with attribute exploration.

Sergei A. ObiedkovDerrick G. KourieJan H. P. Eloff
Published in: Comput. Secur. (2009)
Keyphrases
  • access control models
  • access control
  • role based access control model
  • privacy aware
  • database security
  • fine grained
  • data mining
  • security issues