Building hybrid access control by configuring RBAC and MAC features.
Sangsig KimDae-Kyoo KimLunjin LuEunjee SongPublished in: Inf. Softw. Technol. (2014)
Keyphrases
- access control
- role based access control
- fine grained
- data security
- access control models
- dynamic access control
- access control policies
- security policies
- role based access control model
- mandatory access control
- security mechanisms
- database security
- security model
- rbac model
- security requirements
- identity management
- security architecture
- database
- role assignment
- conflict resolution
- databases
- access control mechanism