No One In The Middle: Enabling Network Access Control Via Transparent Attribution.
Jeremy EricksonQi Alfred ChenXiaochen YuErinjen LinRobert LevyZhuoqing Morley MaoPublished in: AsiaCCS (2018)
Keyphrases
- access control
- fine grained
- data security
- dynamic access control
- security policies
- policy enforcement
- role based access control
- access control models
- security architecture
- security mechanisms
- security model
- directory service
- database security
- trust relationships
- network traffic
- access control systems
- peer to peer
- role based access control model
- wireless sensor networks
- identity management
- role assignment
- databases
- heterogeneous networks
- domain specific