Login / Signup
Cryptographic key assignment scheme for hierarchical access control.
Tzong-Chen Wu
Chin-Chen Chang
Published in:
Comput. Syst. Sci. Eng. (2001)
Keyphrases
</>
access control
fine grained
dynamic access control
security model
data security
security policies
security mechanisms
security requirements
role based access control
identity management
access control models
protection schemes
access control policies
access control mechanism
database security
rbac model
role based access control model
access control systems
role assignment
security analysis
security architecture
trust relationships