Access control in a hierarchy using one-way hash functions.
Cungang YangCelia LiPublished in: Comput. Secur. (2004)
Keyphrases
- access control
- hash functions
- dynamic access control
- fine grained
- similarity search
- data security
- security policies
- random projections
- security mechanisms
- hamming distance
- access control models
- role based access control
- security model
- binary codes
- role based access control model
- rbac model
- secret key
- access control policies
- machine learning
- data distribution
- data structure
- database security
- security requirements
- signature scheme