Login / Signup

An XML-based administration method on role-based access control in the enterprise environment.

Cungang YangChang N. Zhang
Published in: Inf. Manag. Comput. Secur. (2003)
Keyphrases
  • information systems
  • data mining
  • intrusion detection