Computer Science
Access Control
9%
Access Control Decision
9%
Access Control Policies
100%
Attackers
9%
Attribute-Based Access Control
27%
Authorizing Access
9%
Data Surveillance
9%
Decision-Making
9%
Dynamic Access Control
18%
Extract Information
9%
Markup Language
9%
Privacy Requirement
9%
Proposed Mechanism
9%
Protecting Privacy
9%
Research Effort
18%
Role-Based Access Control
45%
Security and Privacy
100%
Security Aspect
9%
Security Requirements
18%
Security Solution
9%
Video Surveillance
100%
video surveillance system
54%
Keyphrases
Control Decision-making
16%
Hierarchical Relations
16%
Privacy Enhancing Techniques
16%
Privacy Sensitive
16%
Protecting Privacy
16%
Role Hierarchy
16%
Role-oriented
100%
Voyeurism
16%