DavidFerraioloD.RichardKuhnRamaswamyChandramouli
The authors explain role based access control (RBAC), its administrative and cost advantages, implementation issues and imigration from conventional access control methods to RBAC.