How to Do Discretionary Access Control Using Roles

doi 10.1145/286884.286893
Full Text
Abstract

Available in full text

Date
Authors
Publisher

ACM Press