Extended Role Based Access Control with Procedural Constraints for Trusted Operating Systems.
Wook ShinJong-Youl ParkDong-Ik LeePublished in: IEICE Trans. Inf. Syst. (2005)
Keyphrases
- operating system
- discretionary access control
- role based access control
- mandatory access control
- access control
- computer systems
- multi domain
- data security
- distributed systems
- virtual machine
- object oriented
- windows xp
- information systems
- security mechanisms
- trusted computing
- access control policies
- privacy preserving
- data privacy
- fine grained
- business intelligence
- intrusion detection
- wireless sensor networks
- database systems