A security policy based on the identities and/or attributes of the object (system resource) being accessed and of the subject (user, group of users, process, or device) requesting access.

Loading conversations.
Similar or Related Terms
Statistics
157
Characters
29
Words
33.58
Flesch Reading Ease
15.8
Flesch Kincaid Grade