Search This Blog

Thursday, March 7, 2013

Access control system requirements

Reliability
Transparency
Scalability
Integrity
Maintainability
Authentication data security
Auditability

No comments: