|
Volumn , Issue , 1998, Pages 47-54
|
How to do discretionary access control using roles
a a |
Author keywords
[No Author keywords available]
|
Indexed keywords
COMPUTER SIMULATION;
CONSTRAINT THEORY;
DATA PRIVACY;
DATA STRUCTURES;
HIERARCHICAL SYSTEMS;
INFORMATION MANAGEMENT;
INFORMATION RETRIEVAL;
ONLINE SYSTEMS;
DISCRETIONARY ACCESS CONTROL (DAC);
MANDATORY ACCESS CONTROL (MAC);
ROLE-BASED ACCESS CONTROL (RBAC);
SECURITY OF DATA;
|
EID: 0031599992
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1145/286884.286893 Document Type: Article |
Times cited : (115)
|
References (12)
|