CAN Authorization Using Message Priority Bit-Level Access Control.
Adam J. BrownTodd R. AndelMark YampolskiyJeffrey Todd McDonaldPublished in: ICDIS (2018)
Keyphrases
- access control
- dynamic access control
- fine grained
- security policies
- data security
- access control policies
- role based access control
- role assignment
- role based access control model
- access control models
- security architecture
- access control mechanism
- security mechanisms
- security model
- protection schemes
- access control systems
- security requirements
- database
- trust relationships
- identity management
- data protection