Technologies for Repository Interoperation and Access Control.
Shirley BrowneJack J. DongarraJeff HornerPaul McMahanScott WellsPublished in: ACM DL (1998)
Keyphrases
- access control
- identity management
- dynamic access control
- fine grained
- data security
- security policies
- access control models
- role based access control
- access control mechanism
- access control policies
- data mining
- access control systems
- security architecture
- security mechanisms
- role based access control model
- role assignment
- security model
- semantic web services
- digital libraries
- web services
- metadata
- data protection