Question:
Temporal isolation. AKA time-based access control is often used in conjunction with other authentication methods, particularly role-based access control (RBAC).
Author: John IntindoloAnswer:
What technique is used to extend the capability of a role-based access control mechanism? - Temporal isolation - Scrubbing - Polyinstantiation - Asset valuation
0 / 5 Â (0 ratings)
1 answer(s) in total
Author
John Intindolo