Cryptographically-enforced hierarchical access control with multiple keys.
Jason CramptonPublished in: J. Log. Algebraic Methods Program. (2009)
Keyphrases
- access control
- fine grained
- data security
- security model
- security policies
- dynamic access control
- access control policies
- role based access control
- security mechanisms
- identity management
- access control systems
- access control models
- role based access control model
- security requirements
- role assignment
- relational databases
- security architecture
- unauthorized access
- database