Research Article
Enterprise Information Security Management Based on Context-Aware RBAC and Communication Monitoring Technology
Table 4
Permissions for document usage.
| | Control group | Roles | Communication monitoring technology |
| | DRM management | Marketing staff | Read/bring out/open/ print/control and audit | | Sales staff |
|
|