Research Article

Enterprise Information Security Management Based on Context-Aware RBAC and Communication Monitoring Technology

Table 7

Permissions for P2P usage.

Control groupRolesCommunication monitoring technology

P2P usage controlOperations staffSystem development staffBlock P2P related software
Human resource staffMaintenance staff
Administrative staffLogistics staff
General staffDrawing staff
Legal staffDesign staff
Marketing staffText staff
Planning staffMedia dissemination staff
Project management staffResearch staff
Sales staffFinancial staff
Trade staffā€‰