?

Which of the following is not a useful control procedure to control access to system outputs?