Cryptographic Enforcement of Access Control while Mitigating Key Sharing.
Keith B. FrikkenPublished in: SECRYPT (2012)
Keyphrases
- access control
- protection schemes
- fine grained
- data security
- security policies
- high assurance
- dynamic access control
- role based access control
- access control policies
- policy enforcement
- rbac model
- security requirements
- role based access control model
- security model
- access control models
- security mechanisms
- information sharing
- usage control
- access control mechanism
- role assignment
- data sharing
- database
- security architecture
- distributed environment
- data protection
- database security