2020
DOI: 10.30534/ijeter/2020/12842020
|View full text |Cite
|
Sign up to set email alerts
|

Development of an Algorithm for Implementing Mandatory and Role-Based Access Control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…Formally, when implementing the method, in general, the information system ∑( * , )is represented by the set of all its states - * and the set of state transformation rules -. Moreover, each state of the information system ∑( * , )is represented by a tuple ( , , ) and includes the following elements in its description [11].…”
Section: Implementation In the Information Systemmentioning
confidence: 99%
“…Formally, when implementing the method, in general, the information system ∑( * , )is represented by the set of all its states - * and the set of state transformation rules -. Moreover, each state of the information system ∑( * , )is represented by a tuple ( , , ) and includes the following elements in its description [11].…”
Section: Implementation In the Information Systemmentioning
confidence: 99%