Y Chunxiao, W Zhongfu… - Journal of Research and …, 2006 - search.informit.org
In existing delegation models, delegation security entirely depends on delegators and
security administrators, for delegation constraint in these models is only a prerequisite …