Decomposing, Comparing, and Synthesizing Access Control Expressiveness Simulations.
William C. Garrison IIIAdam J. LeePublished in: CSF (2015)
Keyphrases
- access control
- fine grained
- dynamic access control
- data security
- security policies
- security mechanisms
- identity management
- security requirements
- access control policies
- role based access control
- access control mechanism
- role based access control model
- workflow systems
- security model
- rbac model
- database security
- security architecture
- protection schemes