Research Article

Enterprise Information Security Management Based on Context-Aware RBAC and Communication Monitoring Technology

Figure 3

Flowchart of proposed architecture.
569562.fig.003