Access Control 44


Access Control 44 : Computer security: (5) Access control models: (5. 5) Role-based access Control RBAC: Three Primary Rules Are Defined for RBAC: (2) Role Authorization: A subject's active role must be authorized for the subject. With rule 1 above, this rule ensures that users can take on only roles for which they are authorized
No records Found
afaatim.com copyright © April 2016 Dr.K.R.Kamaal. All rights reserved