Login / Signup
Discovering access-control misconfigurations: new approaches and evaluation methodologies.
Lujo Bauer
Yuan Liang
Michael K. Reiter
Chad Spensky
Published in:
CODASPY (2012)
Keyphrases
</>
access control
access control models
evaluation methodologies
fine grained
dynamic access control
security policies
data security
role based access control
security mechanisms
security model
access control policies
information retrieval
distributed environment