Re-thinking networked privacy, security, identity and access control in our surveillance states.
Andrew ClementPublished in: SACMAT (2014)
Keyphrases
- access control
- identity management
- data security
- security policies
- security mechanisms
- fine grained
- policy enforcement
- security model
- dynamic access control
- security requirements
- access control models
- role based access control
- database security
- access control policies
- security architecture
- role assignment
- trust relationships
- surveillance system
- rbac model
- access control mechanism
- access control systems
- cloud computing
- unauthorized access
- data protection
- personal information
- usage control
- high assurance
- service providers
- authentication and access control