Login / Signup

A model of OASIS role-based access control and its support for active security.

Jean BaconKen MoodyWalt Yao
Published in: ACM Trans. Inf. Syst. Secur. (2002)
Keyphrases
  • access control
  • security model
  • role based access control
  • database systems
  • peer to peer
  • anomaly detection