Predicting attribute based user trustworthiness for access control of resources.
Punam BediBhavna GuptaHarmeet KaurPublished in: HIS (2012)
Keyphrases
- access control
- ubiquitous computing environments
- fine grained
- data security
- dynamic access control
- security policies
- trust relationships
- identity management
- role based access control
- databases
- role assignment
- security mechanisms
- data protection
- security requirements
- security architecture
- role based access control model
- access control systems
- database security
- security model
- access control models
- usage control
- discretionary access control
- data privacy
- resource constraints
- location information
- end users