Improved system-access control using complementary technologies.
Les LabuschagneJan H. P. EloffPublished in: Comput. Secur. (1997)
Keyphrases
- access control
- identity management
- fine grained
- data security
- dynamic access control
- security policies
- role based access control
- access control policies
- rbac model
- security architecture
- role assignment
- security model
- access control models
- database security
- data mining
- security requirements
- access control mechanism
- access control systems
- unauthorized access
- usage control
- role based access control model