Login / Signup
The design of integrating subliminal channel with access control.
Narn-Yih Lee
Shu-Ya Yang
Published in:
Appl. Math. Comput. (2005)
Keyphrases
</>
access control
fine grained
dynamic access control
security policies
design process
high assurance
data security
access control policies
security model
identity management
access control models
role assignment
access control systems
database
role based access control
security requirements
databases