Browsing by Subject "Computers Access control"
Now showing items 1-1 of 1
-
Access control scheme for partially ordered set hierarchy with provable security
(2005)In many multi-user information systems, the users are organized as a hierarchy. Each user is a subordinate, superior and/or coordinate of some others. In such systems, a user has access to the information if and only if ...