next up previous contents
Next: 4.1.32 How are privacy Up: 4.1 General Previous: 4.1.30 Are the any

4.1.31 How is access controlled?

 

Nick Battle
(July, 1998) : Access is controlled using the initiator's authenticated attributes which are retrieved from the received credentials; audit is similarly able to record the user's access quoting their authenticated attributes.