Research Article
Enterprise Information Security Management Based on Context-Aware RBAC and Communication Monitoring Technology
Table 4
Permissions for document usage.
| Control group | Roles | Communication monitoring technology |
| DRM management | Marketing staff | Read/bring out/open/ print/control and audit | Sales staff |
|
|