Security Violation Detection for RBAC Based Interoperation in Distributed Environment.
Xinyu WangJianling SunXiaohu YangChao HuangDi WuPublished in: IEICE Trans. Inf. Syst. (2008)
Keyphrases
- distributed environment
- access control
- access control policies
- role based access control
- highly distributed
- distributed systems
- distributed computing
- intelligent agents
- distributed databases
- security mechanisms
- border control
- access control models
- security policies
- information security
- peer to peer networks
- distributed data mining
- data sources
- security issues
- provide efficient solutions
- security model
- security requirements
- statistical databases
- network security
- peer to peer
- malware detection
- distributed computing environment
- distributed data sources
- mining of association rules
- rbac model
- fuzzy logic
- databases