Dynamic user-centric access control for detection of ransomware attacks.
Timothy R. McIntoshA. S. M. KayesYi-Ping Phoebe ChenAlex NgPaul A. WattersPublished in: Comput. Secur. (2021)
Keyphrases
- access control
- user centric
- identity management
- security mechanisms
- data security
- unauthorized access
- dynamic access control
- security policies
- personal information
- role based access control
- access control policies
- security model
- access control models
- security architecture
- security requirements
- context sensitive
- access control systems
- database
- context awareness
- access control mechanism
- social networks
- protection schemes