Privacy Control Using GRBAC In An Extended Role-Based Access Control Model
Vol. 30, No. 3, pp. 167-175, Mar. 2005
Abstract
Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[IEEE Style]
C. h. Park, J. h. Kim, D. k. Kim, "Privacy Control Using GRBAC In An Extended Role-Based Access Control Model," The Journal of Korean Institute of Communications and Information Sciences, vol. 30, no. 3, pp. 167-175, 2005. DOI: .
[ACM Style]
Chong hwa Park, Ji hong Kim, and Dong kyoo Kim. 2005. Privacy Control Using GRBAC In An Extended Role-Based Access Control Model. The Journal of Korean Institute of Communications and Information Sciences, 30, 3, (2005), 167-175. DOI: .
[KICS Style]
Chong hwa Park, Ji hong Kim, Dong kyoo Kim, "Privacy Control Using GRBAC In An Extended Role-Based Access Control Model," The Journal of Korean Institute of Communications and Information Sciences, vol. 30, no. 3, pp. 167-175, 3. 2005.