Information Technology Reference
In-Depth Information
Fig. 16.9 Communication management
16.9 Security Management
As shown in Fig. 16.10 , the block supports actors in the following main steps:
1. Deal with User Account, Role and Profile;
2. Deal with Content Access Permissions;
3. Deal with Digital Rights;
4. Guarantee Authenticity.
Fig. 16.10 Security management
Search WWH ::




Custom Search