Client-side access control enforcement using trusted computing and PEI models.
Ravi S. SandhuXinwen ZhangKumar RanganathanMichael J. CovingtonPublished in: J. High Speed Networks (2006)
Keyphrases
- access control
- discretionary access control
- access control policies
- fine grained
- access control models
- data security
- mandatory access control
- dynamic access control
- security policies
- role based access control
- trusted computing
- security mechanisms
- identity management
- policy enforcement
- database
- software development
- information systems