Trusted and only Trusted. That is the Access! - Improving Access Control Allowing only Trusted Execution Environment Applications.
Dalton Cézane Gomes ValadaresAlvaro SobrinhoNewton Carlos WillKyller Costa GorgônioAngelo PerkusichPublished in: AINA (3) (2023)
Keyphrases
- access control
- trust relationships
- execution environment
- data security
- security policies
- trusted computing
- access control policies
- dynamic access control
- access control systems
- security mechanisms
- identity management
- distributed environment
- database security
- discretionary access control
- access control models
- database
- databases