Return to Article Details
Analysis of formal models for access control and specific features of their applicability to databases
Download
Download PDF