Processing Logical Access Control Command in Computer System.
Tsang-Yean LeeHuey-Ming LeeWuu-Yee ChenHeng-Sheng ChenPublished in: J. Digit. Content Technol. its Appl. (2008)
Keyphrases
- access control
- computer systems
- data processing
- operating system
- fine grained
- dynamic access control
- data security
- hardware and software
- computing systems
- role based access control
- security policies
- security mechanisms
- access control models
- access control policies
- role based access control model
- security model
- computer networks
- computer security
- security requirements
- identity management
- rbac model
- information systems
- databases
- role assignment
- machine learning
- data protection
- security architecture
- access control mechanism
- digital rights management
- data analysis
- usage control