Designing an optimized confidential-data management system using preeminent access-control and block-chain.
K. MadhuraR. MahalakshmiPublished in: Int. J. Intell. Comput. Cybern. (2023)
Keyphrases
- access control
- fine grained
- dynamic access control
- data security
- security policies
- role based access control
- access control models
- access control policies
- identity management
- security mechanisms
- security model
- access control mechanism
- security requirements
- unauthorized access
- role assignment
- statistical databases
- database security
- role based access control model
- original data