Login / Signup
Deployment of a posteriori access control using IHE ATNA.
Hanieh Azkia
Nora Cuppens-Boulahia
Frédéric Cuppens
Gouenou Coatrieux
Said Oulmakhzoune
Published in:
Int. J. Inf. Sec. (2015)
Keyphrases
</>
access control
fine grained
dynamic access control
data security
security policies
role based access control
access control policies
role based access control model
security mechanisms
access control models
security architecture
role assignment
identity management
rbac model
security model
access control systems
unauthorized access
smart card