2012
DOI: 10.17223/20710410/17/8
|View full text |Cite
|
Sign up to set email alerts
|

Hierarchical role-based access control development

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…In the context of a role-based access control, for which many modifications and extensions have been proposed [3,4,5,6,7,8,9,10], first of all an analysis of the problem of users' excessive permissions is needed. Obviously, this indicator is decisive in assessing the possibility of unauthorized transmission of information.…”
Section: Introductionmentioning
confidence: 99%
“…In the context of a role-based access control, for which many modifications and extensions have been proposed [3,4,5,6,7,8,9,10], first of all an analysis of the problem of users' excessive permissions is needed. Obviously, this indicator is decisive in assessing the possibility of unauthorized transmission of information.…”
Section: Introductionmentioning
confidence: 99%