First Page | Document Content | |
---|---|---|
![]() Date: 2010-10-12 08:02:25Role-based access control Identity management Data security Role hierarchy PERMIS Information security AGDLP Delegated administration Security Computer security Access control | Source URL: knight.segfaults.netDownload Document from Source WebsiteFile Size: 263,63 KBShare Document on Facebook |