Return to Article Details Authentication and Authorization Mechanisms in Secure Systems: Their Impact on Information Assurance and Access Control Download Download PDF