Managing key hierarchies for access control enforcement: Heuristic approaches.
Carlo BlundoStelvio CimatoSabrina De Capitani di VimercatiAlfredo De SantisSara ForestiStefano ParaboschiPierangela SamaratiPublished in: Comput. Secur. (2010)
Keyphrases
- access control
- access control models
- fine grained
- data security
- dynamic access control
- access control policies
- security policies
- role based access control
- database security
- data protection
- identity management
- role based access control model
- security model
- access control systems
- security mechanisms
- discretionary access control
- xml access control
- policy enforcement
- protection schemes
- security architecture
- directory service