This is a site designed to make it easier to
take the core of large published reports and
allow anyone to comment on them.
8.4.2 Many of the threats to the confidentiality of data-stores may be countered
through suitably assured authentication and access control mechanisms,
supported by physical and procedural measures.
Email this to a friend.
Previous item —
We only allow the following html tags em strong blockquote p br. After posting, there may be a short delay before your comment appears on the site