Secure States versus Secure Executions - From Access Control to Flow Control.
Mathieu JaumeRadoniaina AndriatsimandefitraValérie Viet Triem TongLudovic MéPublished in: ICISS (2013)
Keyphrases
- access control
- data security
- security mechanisms
- identity management
- security requirements
- flow control
- access control mechanism
- security architecture
- security model
- unauthorized access
- rbac model
- xml access control
- security policies
- security issues
- digital rights management
- role based access control
- security analysis
- dynamic access control
- data protection
- rights management
- smart card
- data management
- authentication and access control
- privacy preserving
- access control policies
- intrusion detection system
- relational databases
- databases