Applying staged event-driven access control to combat ransomware.
Timothy R. McIntoshA. S. M. KayesYi-Ping Phoebe ChenAlex NgPaul A. WattersPublished in: Comput. Secur. (2023)
Keyphrases
- access control
- event driven
- fine grained
- dynamic access control
- security policies
- data security
- role based access control
- security mechanisms
- security model
- access control policies
- real time
- access control models
- security architecture
- database security
- role assignment
- rbac model
- data protection
- role based access control model
- access control systems
- access control mechanism
- integrity constraints
- markup language