explain how to identify the system security administrator and any project administrators and their functions. The correct access must be set on the system administration database, which would include user registry, group definitions, etc.
|Title||:||Guide to Understanding Discretionary Access Control in Trusted Systems|
|Author||:||Carole S. Jordan|
|Publisher||:||DIANE Publishing - 1987-06-01|