Risk Based Security Analysis of Permissions in RBAC.
Nimal NissankeEtienne J. KhayatPublished in: WOSIS (2004)
Keyphrases
- security analysis
- access control policies
- access control
- security requirements
- role based access control
- security model
- conflict resolution
- security policies
- distributed environment
- rbac model
- fine grained
- high security
- access control models
- public key
- image encryption
- authentication protocol
- security mechanisms
- data security
- user authentication
- authentication scheme
- smart card
- encryption scheme
- mutual authentication
- software architecture
- database systems