Secret Sharing Scheme Based Approach for Access Control Constraint Against Similar Users' Collusive Attack.
Nurmamat HelilKaysar RahmanPublished in: J. Inf. Sci. Eng. (2016)
Keyphrases
- access control
- access control mechanism
- secret sharing scheme
- trust relationships
- unauthorized access
- security policies
- dynamic access control
- secret sharing
- data security
- access control systems
- role based access control
- security mechanisms
- access control models
- access control policies
- key management
- security requirements
- access rights
- data warehouse
- mobile devices