[Next]
[Up]
[Previous]
[Contents]
Next: 4.1.32 How are privacy
Up: 4.1 General
Previous: 4.1.30 [IMAGE ]Are the
- Nick Battle
- (July, 1998) : Access is controlled using the initiator's authenticated
attributes which are retrieved from the received credentials; audit is similarly
able to record the user's access quoting their authenticated attributes.