Keyphrases
- access control
- access control mechanism
- unauthorized access
- fine grained
- security policies
- data security
- dynamic access control
- access control policies
- role based access control
- end users
- security model
- ubiquitous computing environments
- identity management
- security mechanisms
- security architecture
- trust relationships
- access control systems
- access control models
- user centric
- role based access control model
- access rights
- social media
- database security
- rbac model
- intrusion detection system
- role assignment
- conflict resolution
- usage control