A trusted user-to-role and role-to-key access control scheme
Crossref DOI link: https://doi.org/10.1007/s00500-015-1715-4
Published Online: 2015-05-31
Published Print: 2016-05
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Chen, Hsing-Chung
Text and Data Mining valid from 2015-05-31