Login / Signup
A study of interactive code annotation for access control vulnerabilities.
Tyler Thomas
Bill Chu
Heather Richter Lipford
Justin Smith
Emerson R. Murphy-Hill
Published in:
VL/HCC (2015)
Keyphrases
</>
access control
fine grained
data security
security mechanisms
dynamic access control
role based access control
source code
databases
object oriented
distributed systems
access control policies
security model
access control models