This is a site designed to make it easier to take the core of large published reports and allow anyone to comment on them.


General 8.8.1 At Confidentiality IL2 auditable system operation and the use of stringent access control are required. The use of suitably assured116 commercial cryptographic products to provide access control is appropriate for some purposes is required at this level.

Email this to a friend.
Previous itemNext item.


(You must give a valid email address, but it will not be displayed to the public.)

We only allow the following html tags em strong blockquote p br. After posting, there may be a short delay before your comment appears on the site