First Page | Document Content | |
---|---|---|
![]() Date: 2008-02-07 14:26:30Copyright law Identity management Digital rights management Mandatory access control Discretionary access control Access Control Matrix Role-based access control Information security Authorization Security Computer security Access control | Source URL: profsandhu.comDownload Document from Source WebsiteFile Size: 371,51 KBShare Document on Facebook |