- rule-based security
- безопасность, определяемая установленными правилами
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Security guard — Private factory guard Occupation Activity sectors Security Description A security guard (or security officer) is a person who is paid to protect pro … Wikipedia
Rule by decree — is a style of governance allowing quick, unchallenged creation of law by a single person or group, and is used primarily by dictators and absolute monarchs, although philosophers such as Giorgio Agamben have argued that it has been generalized… … Wikipedia
Security-Enhanced Linux — The SELinux administrator in Fedora 8 Security Enhanced Linux (SELinux) is a Linux feature that provides a mechanism for supporting access control security policies, including United States Department of Defense style mandatory access controls,… … Wikipedia
Security and safety features new to Windows Vista — There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.Beginning in early 2002 with Microsoft s announcement of their Trustworthy Computing… … Wikipedia
Rule in Dearle v Hall — The rule in Dearle v Hall (1828) 3 Russ 1 is an English common law rule to determine priority between competing equitable claims to the same asset. The rule broadly provides that where the equitable owner of an asset purports to dispose of his… … Wikipedia
Security certificate — This article is about the Canadian legal mechanism. For Internet security certificates, see Public key certificate. In Canadian law, a security certificate is a mechanism by which the Government of Canada can detain and deport foreign nationals… … Wikipedia
Rule of law — The rule of law, in its most basic form, is the principle that no one is above the law. Thomas Paine stated in his pamphlet Common Sense (1776): For as in absolute governments the king is law, so in free countries the law ought to be king; and… … Wikipedia
Security interest — A security interest is a property interest created by agreement or by operation of law over assets to secure the performance of an obligation, usually the payment of a debt.[1] It gives the beneficiary of the security interest certain… … Wikipedia
Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… … Wikipedia
Class-based programming — Programming paradigms Agent oriented Automata based Component based Flow based Pipelined Concatenative Concurrent computin … Wikipedia
Social rule system theory — is an attempt to formally approach different kinds of social rule systems in a unified manner. Social rules systems include institutions such as norms, laws, regulations, taboos, customs, and a variety of related concepts and are important in the … Wikipedia