Die Inhalte dieser Webseite enthalten Affiliate-Links, für die wir möglicherweise eine Vergütung erhalten.
  • Bild 1
  • Bild 2

Access Control Management in Cloud Environments by Wang, Hua NEUF

82,90 €

Currently, there is not a book available that has reported the techniques covering the protocols with anonymizations and Blockchain technology. One is related to the authorization granting process. For example, when a role is granted to a user, this role may conflict with other roles of the user or together with this role; the user may have or derive a high level of authority.

Jetzt bei Ebay: