Return to Article Details Combining Pretty Good Privacy and Role-Based Access Control Technologies for Access Protection to Confidential Data Download Download PDF