

Securing Data Storage By Extending Role-Based Access Control
Publisher: IGI Global_journal
E-ISSN: 2156-1826|3|4|28-37
ISSN: 2156-1834
Source: International Journal of Cloud Applications and Computing (IJCAC), Vol.3, Iss.4, 2013-10, pp. : 28-37
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content







