Not logged in : Login |
Data access control informed by applying reasoning and inference to the collective attributes of all actors seeking access (read, write, or execute) to a protected artifact on a network (e.g., Intranet, World Wide Web, or Internet).