Computer Science ›› 2008, Vol. 35 ›› Issue (8): 65-68.

Previous Articles     Next Articles

  

  • Online:2018-11-16 Published:2018-11-16

Abstract: Due to lock the mechanism of controlling information flow, the authorized accesses of RBAC model may lead to insecure information flow. To protect confidentiality of information in RBAC model systems, the concept of illegal information flow is defined, al

Key words: RBAC, Illegal information flow, Users of inducing, Users of threatening

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!