|
ComputingReviews.com
|
Configuring role-based access control to enforce mandatory and discretionary access control policies Osborn S., Sandhu R., Munawer Q. ACM Transactions on Information and System Security3(2):85-106,2000.Type:Article |
|
|
|
Published By: ACM Press |
|
|
|
|
|
|
|
|
Use your personal or institutional subscription to read the fulltext of the article.
|
|
|
|
|
|
|
|
|
|
|
|