Short Answer
A __________ is a mapping between a user and an activated subset of the set of roles to which the user is assigned.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q9: An independent review and examination of system
Q10: An ABAC model can define authorizations that
Q11: _ is based on the roles the
Q12: _ controls access based on comparing security
Q13: _ is verification that the credentials of
Q15: A constraint is a defined relationship among
Q16: Any program that is owned by, and
Q17: A concept that evolved out of requirements
Q18: The principal objectives of computer security are
Q19: A _ dictates that a user can