Access Control Requirements for Physical Spaces Protected by Virtual Perimeters.
Brian GreavesMarijke CoetzeeWai Sze LeungPublished in: TrustBus (2018)
Keyphrases
- access control
- data protection
- dynamic access control
- fine grained
- unauthorized access
- data security
- workflow systems
- security policies
- identity management
- access control mechanism
- access control policies
- role based access control
- virtual world
- security mechanisms
- database security
- role assignment
- security requirements
- role based access control model
- access control systems
- relational databases
- high assurance
- data model