: enforcing security policies in outsourced environments with encrypted RBAC.
Muhammad Rizwan AsgharGiovanni RusselloBruno CrispoPublished in: CCS (2011)
Keyphrases
- security policies
- access control
- access control policies
- ubiquitous computing environments
- access control systems
- role based access control
- access control mechanism
- fine grained
- security concerns
- data security
- security management
- network security
- security requirements
- third party
- rbac model
- distributed systems
- knowledge discovery
- mandatory access control
- security mechanisms
- multilevel secure
- distributed environment
- real world
- dacs scheme