Research Article

Enterprise Information Security Management Based on Context-Aware RBAC and Communication Monitoring Technology

Table 4

Permissions for document usage.

Control groupRolesCommunication monitoring technology

DRM managementMarketing staff Read/bring out/open/
 print/control and audit
Sales staff