Login / Signup
Authorization for Metacomputing Applications.
G. Gheorghiu
Tatyana Ryutov
B. Clifford Neuman
Published in:
HPDC (1998)
Keyphrases
</>
access control
fine grained
conflict resolution
security policies
security requirements
role based access control
dynamic access control
databases
distributed computing
usage control
data sets
real world
information systems
trust management
rbac model
access requests