Return to Article Details
Combining Pretty Good Privacy and Role-Based Access Control Technologies for Access Protection to Confidential Data
Download
Download PDF