Work:
Access control services regulate user access to data. These services mitigate the threats of spoofing host identity and elevating host privileges. Both these
threats affect data integrity and confidentiality.
Access control mechanisms used in the application access domain are user and host authentication (technical control) and authorization (administrative
control). These mechanisms may lie outside the boundaries of the storage net-work and require various systems to interconnect with other enterprise identity
management and authentication systems, for example, systems that provide strong authentication and authorization to secure user identities against spoofing.
Answer:
Authentication and authorization.