Role Based Security and Java.
Debra L. SmarkuskySteven A. DemurjianM. Cecilia BastarricaT. C. TingPublished in: DBSec (1998)
Keyphrases
- access control
- role based access control
- information security
- data security
- security requirements
- security policies
- programming language
- role assignment
- access control systems
- security issues
- trust negotiation
- intrusion detection
- java card
- computer security
- mobile agent system
- security model
- network security
- security mechanisms
- open source
- database security
- security threats
- security problems
- access control models
- java programs
- data integrity
- security level
- security systems
- security protocols
- information systems
- key management
- statistical databases
- anomaly detection
- object oriented