Gong-Xuan Zhang

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
Constraint specifications for access control organize a set of constraints to control human-computer interaction for users to perform their duties securely and efficiently. Constraint specifications are imperative for the access control and security management of large and complex multi-user interactive applications. Existing specifications of Role-based(More)
  • 1