Computer Science ›› 2008, Vol. 35 ›› Issue (8): 65-68.
Previous Articles Next Articles
Online:
Published:
Abstract: Due to lock the mechanism of controlling information flow, the authorized accesses of RBAC model may lead to insecure information flow. To protect confidentiality of information in RBAC model systems, the concept of illegal information flow is defined, al
Key words: RBAC, Illegal information flow, Users of inducing, Users of threatening
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2008/V35/I8/65
Cited