Login / Signup

A model of accountability, confidentiality and override for healthcare and other applications.

Jim J. LongstaffMike A. LockyerM. G. Thick
Published in: ACM Workshop on Role-Based Access Control (2000)
Keyphrases