description
| - Data access control informed by applying reasoning and inference to the collective attributes
of all actors seeking access (read, write, or execute) to a protected artifact on a network
(e.g., Intranet, World Wide Web, or Internet).
- Data access control informed by applying reasoning and inference to the collective attributes
of all actors seeking access (read, write, or execute) to a protected artifact on a network
(e.g., Intranet, World Wide Web, or Internet).
|