Which security concept applies if an architecture diagram illustrates a particular user/role combination with access to an asset or applicaton?
Non-repudiation
Identification
Authorization
Authentication
Submit