Enable delegation for RBAC with Secure Authorization Certificate.
GuangXu ZhouR. Murat DemirerCoskun BayrakLicheng WangPublished in: Comput. Secur. (2011)
Keyphrases
- role based access control
- access control
- rbac model
- authentication and access control
- data security
- access control mechanism
- security mechanisms
- access control policies
- security requirements
- identity management
- security architecture
- security policies
- role based access control model
- fine grained
- public key encryption
- security model
- access control models
- privacy aware
- multi domain
- security issues
- public key infrastructure
- authentication mechanism
- conflict resolution
- database security
- security analysis
- trust relationships
- factor authentication
- access control systems
- data centric
- data management
- digital signature
- trusted computing