Skip to main content
. 2010 May-Jun;17(3):253–264. doi: 10.1136/jamia.2009.002295

Figure 5.

Figure 5

Security architecture showing authentication, authorization and access layer.