September 29, 2006
Author(s)
Chung Tong Hu, David F. Ferraiolo, David R. Kuhn
… safety, or defense include some form of access control. In many systems access control takes the form of a simple … but many require more sophisticated and complex control. In addition to the authentication mechanism (such as a … used access control services available in information technology systems, their structure, where they are likely to …