On the application of fuzzy set theory for access control enforcement
Access control is a vital part of any computer system. When it comes to access to data, deterministic access control models such as RBAC are still widely used today, but they lack the flexibility needed to support some recent scenarios. These include scenarios where users and data can be dynamically...
Main Author: | |
---|---|
Other Authors: | , |
Format: | conferenceObject |
Language: | eng |
Published: |
1000
|
Subjects: | |
Online Access: | http://hdl.handle.net/10773/18236 |
Country: | Portugal |
Oai: | oai:ria.ua.pt:10773/18236 |