In a computer system in which one or more computers on which one or more
initiators operate and a storage device on which one or more targets
operate are connected with each other through a network, an
authentication table for authenticating validity of a user of a computer
is associated with an authorization table for authorizing access of an
initiator to a certain target, to limit such accesses.