Access Control Encryption: Enforcing Information Flow with Cryptography.
Ivan DamgårdHelene HaaghClaudio OrlandiPublished in: CoRR (2016)
Keyphrases
- information flow
- access control
- information security
- data protection
- digital rights management
- data security
- fine grained
- dynamic access control
- access control policies
- social networks
- security policies
- security requirements
- role based access control
- encryption scheme
- security issues
- intrusion detection
- smart card
- network security
- security mechanisms
- secret key
- security model
- information systems
- encryption algorithm
- supply chain
- data encryption
- access control models
- rbac model
- communication networks
- database security
- privacy concerns
- access control systems
- sensitive data
- data mining