Configuring role-based access control to enforce mandatory and discretionary access control policies.
Sylvia L. OsbornRavi S. SandhuQamar MunawerPublished in: ACM Trans. Inf. Syst. Secur. (2000)
Keyphrases
- access control policies
- role based access control
- access control
- conflict resolution
- security policies
- distributed environment
- access control systems
- access control models
- fine grained
- privacy aware
- access control mechanism
- data security
- security mechanisms
- security requirements
- databases
- distributed systems
- loosely coupled
- information flow
- data management