Security Functions Needed
Identification
Authentication - proof of identity
Authorisation - privileges belonging to identity
Delegation and administration
Recording
Monitoring
Slide 13
©Copyright 1997
Jan Newmarch