Representing sequences of actions in access control security policies.
Salem BenferhatMouslim TolbaKarim TabiaAbdelkader BelkhirPublished in: PrAISe@ECAI (2016)
Keyphrases
- security policies
- access control
- fine grained
- fine grained access control
- access control systems
- security requirements
- access control policies
- security management
- data security
- dynamic access control
- security architecture
- security mechanisms
- access control mechanism
- ubiquitous computing environments
- security model
- access control models
- unauthorized access
- role based access control
- databases
- database security
- network security
- digital rights management
- rbac model
- computer systems
- mandatory access control
- distributed systems