Research Article

Enterprise Information Security Management Based on Context-Aware RBAC and Communication Monitoring Technology

Figure 5

System flow of enterprise ISMS.
569562.fig.005