Login / Signup
The Conflict Detection Between Permission Assignment Constraints in Role-Based Access Control.
Chang-Joo Moon
Woojin Paik
Young-Gab Kim
JuHum Kwon
Published in:
CISC (2005)
Keyphrases
</>
role based access control
conflict detection
access control
access control policies
rbac model
data security
conflict resolution
multi domain
fine grained
security policies
resource constraints
data mining
domain specific
operating system
distributed environment