Sign in

Controlling the Access Requests in an Information Protection System.

Chin-Chen ChangTzong-Chen Wu
Published in: Inf. Process. Manag. (1993)
Keyphrases
  • information sharing
  • end users
  • database
  • information systems
  • private information