2009
DOI: 10.1007/978-3-642-05250-7_42
|View full text |Cite
|
Sign up to set email alerts
|

Trust-Based Fuzzy Access Control Model Research

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2011
2011
2013
2013

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 7 publications
0
1
0
Order By: Relevance
“…Fuzzy relations, and fuzzy concepts in general, have been used to extend RBAC [17,15,10], and other access control models [16,8,14]. We provide a novel approach by considering the fuzziness of the RBAC model itself rather than adding fuzzy concepts on top of a traditional RBAC model contributing with a more clear and generic definition.…”
Section: Introductionmentioning
confidence: 99%
“…Fuzzy relations, and fuzzy concepts in general, have been used to extend RBAC [17,15,10], and other access control models [16,8,14]. We provide a novel approach by considering the fuzziness of the RBAC model itself rather than adding fuzzy concepts on top of a traditional RBAC model contributing with a more clear and generic definition.…”
Section: Introductionmentioning
confidence: 99%