In computer security, being able to interact with data through access control procedures such as identification, authentication and authorization. Contrast with physical access. THIS DEFINITION IS ...
Results that may be inaccessible to you are currently showing.