Isogeny-Based Cryptographic Access Control.
Elena B. AleksandrovaAnna A. ShtyrkinaA. V. YarmakPublished in: Autom. Control. Comput. Sci. (2020)
Keyphrases
- access control
- high assurance
- protection schemes
- fine grained
- smart card
- dynamic access control
- data security
- security policies
- hash functions
- access control policies
- role based access control
- security mechanisms
- security model
- identity management
- access control models
- database security
- access control mechanism
- security requirements
- security architecture
- rbac model
- role based access control model
- unauthorized access