Skip to main content

and
  1. Chapter

    Role Delegation for a Resource-Based Security Model

    Corporations and government agencies rely on inter-operating legacy, COTs, databases, clients, servers, etc., with security addressed from different dimensions. One dimension is delegation, where an authorized...

    M. Liebrand, H. Ellis, C. Phillips in Research Directions in Data and Applicatio… (2003)