Rationale
There needs to be a way to protect resources from unauthorized access attempts to read, modify, etc. a resource.
[Next]