Login / Signup
The application of security policy to role-based access control and the common data security architecture.
Along Lin
R. Brown
Published in:
Comput. Commun. (2000)
Keyphrases
</>
access control
security architecture
security policies
data mining techniques
data analysis
database
data processing
data collection
role based access control
information systems
xml documents
knowledge discovery
computer systems
operating system
data quality
data integrity