How to Break Access Control in a Controlled Manner.
Ana FerreiraRicardo João Cruz CorreiaLuis AntunesPedro FarinhaE. Oliveira-PalharesDavid W. ChadwickAltamiro da Costa PereiraPublished in: CBMS (2006)
Keyphrases
- access control
- fine grained
- dynamic access control
- security policies
- data security
- access control policies
- role based access control
- access control models
- security mechanisms
- security requirements
- security model
- access control mechanism
- role based access control model
- access control systems
- role assignment
- database
- identity management
- unauthorized access
- usage control
- information systems
- security architecture
- xml data