How Much Negotiation and Detail Can Users Handle? Experiences with Security Negotiation and the Granularity of Access Control in Communications.
Kai RannenbergPublished in: ESORICS (2000)
Keyphrases
- rbac model
- access control
- role based access control
- access control mechanism
- role based access control model
- security policies
- unauthorized access
- data security
- trust relationships
- fine grained
- security requirements
- dynamic access control
- multi agent systems
- multi agent
- ubiquitous computing environments
- security mechanisms
- conflict resolution
- security model
- access control policies
- security enforcement
- database security
- access control models
- security architecture
- identity management
- role assignment
- policy enforcement
- access control systems
- multi party
- high assurance
- trust management