Login / Signup
Cryptographic access control in a distributed file system.
Anthony Harrington
Christian Damsgaard Jensen
Published in:
SACMAT (2003)
Keyphrases
</>
access control
high assurance
protection schemes
dynamic access control
fine grained
smart card
security policies
data security
role based access control
hash functions
role assignment
security mechanisms
access control policies
security model
access control mechanism
database security
database
identity management
access control systems
access control models
encryption scheme
role based access control model
relational databases
security architecture
trust relationships
digital rights management
access rights
intrusion detection
computer systems