Content deleted Content added
m References |
|||
Line 18:
==Authentication==
This might involve confirming the identity of a person, tracing the origins of an artifact, ensuring that a product is what its packaging and labeling claims to be, or assuring that a computer program is a trusted one.vv
==Authorization==
|