Back to Results
First PageMeta Content
Role-based access control / XACML / PERMIS / Authorization / Workflow / Security / Access control / Computer security


This paper describes the implementation of a Role Based Access
Add to Reading List

Document Date: 2007-05-16 01:00:00


Open Document

File Size: 1,21 MB

Share Result on Facebook
UPDATE