역할기반 접근제어에 기초한 사용자 수준의 위임 기법

Vol. 10, No. 3, pp. 49-62, 6월. 2000
10.13089/JKIISC.2000.10.3.49, Full Text:
Keywords: Database security, role-based access control, Delegation
Abstract

nan

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
심재훈, "User-Level Delegation in Role-Based Access Control Model," Journal of The Korea Institute of Information Security and Cryptology, vol. 10, no. 3, pp. 49-62, 2000. DOI: 10.13089/JKIISC.2000.10.3.49.

[ACM Style]
심재훈. 2000. User-Level Delegation in Role-Based Access Control Model. Journal of The Korea Institute of Information Security and Cryptology, 10, 3, (2000), 49-62. DOI: 10.13089/JKIISC.2000.10.3.49.