Research Article
A New Scalable and Expandable Access Control Model for Distributed Database Systems in Data Security
Table 2
The dimension values of five different users.
| Security dimension | User 1 | User 2 | User 3 | User 4 | User 5 |
| Unit | Unit E | Unit B | Unit D | Unit A | Unit C | Security Classification | Confidential | Secret | Confidential | Secret | Top Secret | Business Title | Nurse | IT Personnel | Nurse | Doctor | IT Personnel | Operation | Processes C and D | Processes B, E, and F | Processes C, D, and E | Processes A, B, and F | Processes A, B, C, D, E, and F |
|
|