Next: 4.1.32 How are privacy
Up: 4.1 General
Previous: 4.1.30 Are the any
- Nick Battle
- (July, 1998) : Access is controlled using the initiator's authenticated
attributes which are retrieved from the received credentials; audit is similarly
able to record the user's access quoting their authenticated attributes.