Securing the perimeter: challenges in enforcing global access control.
David M. NicolPublished in: CSIIRW (2010)
Keyphrases
- access control
- identity management
- fine grained
- data security
- security policies
- access control policies
- dynamic access control
- security mechanisms
- high assurance
- access control models
- security model
- role based access control
- data protection
- access control mechanism
- access control systems
- security requirements
- security architecture
- rbac model
- databases
- database security
- information security
- role based access control model
- data model