what attribute other than individual identity and group membership can be used to restrict unauthori
seenagape
In the context of information security, what attribute other than individual identity and group membership can be used to restrict unauthorized access?