Login / Signup
Enforcing authorizations while protecting access confidentiality.
Sabrina De Capitani di Vimercati
Sara Foresti
Stefano Paraboschi
Gerardo Pelosi
Pierangela Samarati
Published in:
J. Comput. Secur. (2018)
Keyphrases
</>
access control
data security
security policies
role based access control
access control policies
security mechanisms
data protection
security requirements
unauthorized access
databases
web services
information access
database systems
global consistency
search engine
access control systems
real world