First page Back Continue Last page Overview Graphics
User Authentication”
- Every user is positively identified.
- To complete the audit trail
- To decide permissions
Availability:
- Users can access data when they need it without deadlock, starvation or other Denial Of Service type issues.