Login / Signup
Authorization approaches for advanced permission-role assignments.
Hua Wang
Jianming Yong
Jiuyong Li
Min Peng
Published in:
CSCWD (2008)
Keyphrases
</>
access control
role based access control
security policies
strengths and weaknesses
third party
conflict resolution
access control models
reinforcement learning
data mining techniques
fine grained
access control systems