Answer:
The methods by which interactions with resources are limited to collections of users or programs for the purpose of enforcing integrity, confidentiality, or availability constraints.
Previous Question | Next Question |
What is ACID? | What is atomic? |