Management model in data access control systems

被引:0
|
作者
Liu, Qiongbo
You, Jinyuan
机构
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] Application of access control model for confidential data
    Shan, Lumin
    Zhou, Huan
    Hong, Daocheng
    Dong, Qiwen
    Wang, Ye
    Song, Shubing
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (KSE 2021), 2021, 192 : 3865 - 3874
  • [22] An access control model for tree data structures
    Gabillon, A
    Munier, M
    Bascou, JJ
    Gallon, L
    Bruno, E
    INFORMATION SECURITY, PROCEEDINGS, 2002, 2433 : 117 - 135
  • [23] A dynamic Access Control Model for Spatial Data
    Zhang, Fengli
    Chen, Junxin
    Zhou, Hongchuan
    Geng, Zhengwei
    PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 547 - 550
  • [24] Access Control Management as a Service for NoSQL Big Data
    Habiba, Mansura
    Islam, Md Rafiqul
    Ali, A. B. M. Shawkat
    2015 2ND ASIA-PACIFIC WORLD CONGRESS ON COMPUTER SCIENCE AND ENGINEERING (APWC ON CSE 2015), 2015,
  • [25] Access control in distributed heterogeneous database management systems
    Goyal, M.L.
    Singh, G.V.
    Computers and Security, 1991, 10 (07): : 661 - 669
  • [26] Tutorial: Identity Management Systems and Secured Access Control
    Hovav, Anat
    Berger, Ron
    COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2009, 25 : 531 - 570
  • [27] Tutorial: Identity management systems and secured access control
    Hovav, Anat
    Berger, Ron
    Communications of the Association for Information Systems, 2009, 25 (01): : 531 - 570
  • [28] A coordinator for workflow management systems with information access control
    Chou, SC
    Wu, CJ
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2005, E88D (12): : 2786 - 2792
  • [29] A novel access control strategy for distributed data systems
    Zhang, Jianying
    Wang, Xiukun
    Liu, Hongbo
    Meng, Jun
    Journal of Digital Information Management, 2010, 8 (05): : 291 - 297
  • [30] Authorization and access control of application data in workflow systems
    Wu, SG
    Sheth, A
    Miller, J
    Luo, ZW
    JOURNAL OF INTELLIGENT INFORMATION SYSTEMS, 2002, 18 (01) : 71 - 94