@dblp

Evaluation of a Protocol to Prevent Illegal Information Flow Based on Maximal Roles in the RBAC Model.

, , , , and . EIDWT, volume 29 of Lecture Notes on Data Engineering and Communications Technologies, page 80-91. Springer, (2019)

Links and resources

Tags