Deployment of a posteriori access control using IHE ATNA.
Hanieh AzkiaNora Cuppens-BoulahiaFrédéric CuppensGouenou CoatrieuxSaid OulmakhzounePublished in: Int. J. Inf. Sec. (2015)
Keyphrases
- access control
- fine grained
- dynamic access control
- data security
- security policies
- role based access control
- access control policies
- role based access control model
- security mechanisms
- access control models
- security architecture
- role assignment
- identity management
- rbac model
- security model
- access control systems
- unauthorized access
- smart card