- access authorization
- разрешение на доступ, санкционирование доступа
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Access control — is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical… … Wikipedia
Authorization — In security engineering and computer security, authorization is the concept of allowing access to resources only to those permitted to use them. More formally, authorization is a process (often part of the operating system) that protects computer … Wikipedia
Authorization certificate — In computer security, an authorization certificate (also known as an attribute certificate) is a digital document that describes a written permission from the issuer to use a service or a resource that the issuer controls or has access to use.… … Wikipedia
Authorization for Use of Military Force Against Terrorists — The Authorization for Use of Military Force Against Terrorists (USStatute|107|40|115|224|2001|09|18), one of two resolutions commonly known as AUMF (the other being Authorization for Use of Military Force Against Iraq Resolution of 2002 ), was a… … Wikipedia
Authorization Code — A generic term that refers to a code or password that identifies the user as authorized to purchase, sell or transfer items, or to enter information into a security protected space. For example, an authorization code would be required for a… … Investment dictionary
authorization — The giving of approval or permission. Authorization is central to many of the *internal controls found in modern organizations, from the making of *disbursements to the hiring of employees. Authorization can be effected through written signatures … Auditor's dictionary
authorization — The provision of rights or permissions based on identity. Authorization and authentication go hand in hand in networking; your access to services is based on your identity, and the authentication processes confirm that you are who you say you… … Dictionary of networking
IBM Tivoli Access Manager — is an authentication and authorization solution for corporate web services, operating systems, and existing applications. [http://publib.boulder.ibm.com/infocenter/tivihelp/v2r1/topic/com.ibm.itame.doc/am61 admin18.htm#choverview] Tivoli Access… … Wikipedia
Comparison of privilege authorization features — A number of computer operating systems employ security features to help prevent malicious software from gaining sufficient privileges to compromise the computer system. Operating systems lacking such features, such as DOS, Windows implementations … Wikipedia
Multi Party Authorization — (MPA) is a process to protect a telecommunications network, data center or industrial control system from undesirable acts by a malicious insider or inexperienced technician acting alone. MPA requires that a second authorized user approve an… … Wikipedia
Distributed Access Control System — DACS The Distributed Access Control System Original author(s) Developers at Distributed Systems Software Developer(s) Distributed Systems Software Stable release 1.4.26 / September 30, 2011; 14 days ago (2011 09 30) … Wikipedia