Login / Signup
A model of OASIS role-based access control and its support for active security.
Jean Bacon
Ken Moody
Walt Yao
Published in:
ACM Trans. Inf. Syst. Secur. (2002)
Keyphrases
</>
access control
security model
role based access control
database systems
peer to peer
anomaly detection