Tutorial: Identity Management Systems and Secured Access Control.
Anat HovavRon BergerPublished in: Commun. Assoc. Inf. Syst. (2009)
Keyphrases
- access control
- identity management
- access control mechanism
- fine grained
- dynamic access control
- security policies
- data security
- access control models
- role based access control
- security requirements
- security mechanisms
- cloud computing
- access control policies
- intelligent systems
- distributed systems
- user centric
- personal information
- security model
- access control systems
- database
- data mining
- computing environments
- rbac model
- databases