Llwytho...
Deploying ABAC policies using RBAC Systems
The flexibility, portability and identity-less access control features of Attribute Based Access Control(ABAC) make it an attractive choice to be employed in many application domains. However, commercially viable methods for implementation of ABAC do not exist while a vast majority of organizations...
Wedi'i Gadw mewn:
| Cyhoeddwyd yn: | J Comput Secur |
|---|---|
| Prif Awduron: | , , , |
| Fformat: | Artigo |
| Iaith: | Inglês |
| Cyhoeddwyd: |
2019
|
| Pynciau: | |
| Mynediad Ar-lein: | https://ncbi.nlm.nih.gov/pmc/articles/PMC6953980/ https://ncbi.nlm.nih.gov/pubmed/31929684 https://ncbi.nlm.nih.govhttp://dx.doi.org/10.3233/JCS-191315 |
| Tagiau: |
Ychwanegu Tag
Dim Tagiau, Byddwch y cyntaf i dagio'r cofnod hwn!
|