Page
%P
-
Chapter
Role Delegation for a Resource-Based Security Model
Corporations and government agencies rely on inter-operating legacy, COTs, databases, clients, servers, etc., with security addressed from different dimensions. One dimension is delegation, where an authorized...