Research Article

Enterprise Information Security Management Based on Context-Aware RBAC and Communication Monitoring Technology

Table 5

Permissions for web browsing.

Control groupRolesCommunication monitoring technology

Wireless network managementOperations staffSales staffAllowed to use the wireless network
Marketing staffText staff
Project management staffMedia dissemination staff
Planning staffā€‰