Data security and integrity are fostered in several ways:
Data resides with its "owner"
Standard system is "read only"
Protocol (
http
) has built in access rights
Other capabilities are being investigated
Next slide