Access Control Management in Cloud Environments by Wang, Hua NEUF
82,90 €
Currently, there is not a book available that has reported the techniques covering the protocols with anonymizations and Blockchain technology. One is related to the authorization granting process. For example, when a role is granted to a user, this role may conflict with other roles of the user or together with this role; the user may have or derive a high level of authority.
Jetzt bei Ebay: