Login / Signup
Cryptographic key assignment schemes for any access control policy.
Alfredo De Santis
Anna Lisa Ferrara
Barbara Masucci
Published in:
Inf. Process. Lett. (2004)
Keyphrases
</>
access control policies
access control
conflict resolution
security policies
distributed environment
access control mechanism
data sets
databases
database systems
data processing
fine grained
role based access control