next up previous
Next: Role Based Access Control Up: The Role Compatibility Security Previous: Access Control Decision and


Comparison with RBAC and DTE Models



Subsections

Amon Ott