|
Volumn 9, Issue , 2004, Pages 126-135
|
Security analysis in role-based access control
|
Author keywords
Delegation; Role based access control; Role based administration; Trust management
|
Indexed keywords
ALGORITHMS;
COMPUTATIONAL COMPLEXITY;
COMPUTATIONAL METHODS;
COMPUTER OPERATING PROCEDURES;
INFORMATION MANAGEMENT;
MATHEMATICAL MODELS;
PROBLEM SOLVING;
QUERY LANGUAGES;
SOCIETIES AND INSTITUTIONS;
DELEGATION;
ROLE-BASED ACCESS CONTROL;
ROLE-BASED ADMINISTRATION;
TRUST MANAGEMENT;
SECURITY OF DATA;
|
EID: 4143094794
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1145/990036.990058 Document Type: Conference Paper |
Times cited : (52)
|
References (23)
|