Idea: Efficient Evaluation of Access Control Constraints.
Achim D. BruckerHelmut PetritschPublished in: ESSoS (2010)
Keyphrases
- access control
- fine grained
- data security
- security policies
- dynamic access control
- security requirements
- access control models
- security mechanisms
- access control policies
- role assignment
- identity management
- role based access control
- access control systems
- security model
- database
- usage control
- role based access control model
- discretionary access control