- identity-based security policy
- стратегия безопасности, основанная на идентифицирующей информации
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Common Foreign and Security Policy — This article deals with the workings of European Union foreign policy. For the relations between the European Union and third countries, see Foreign relations of the European Union. European Union This a … Wikipedia
Capability-based security — is a concept in the design of secure computing systems. A capability (known in some systems as a key) is a communicable, unforgeable token of authority. It refers to a value that references an object along with an associated set of access rights … Wikipedia
Security clearance — For use by the United Nations, see Security Clearance (UN) A security clearance is a status granted to individuals allowing them access to classified information, i.e., state secrets, or to restricted areas after completion of a thorough… … Wikipedia
Identity theft — is a form of stealing another person s identity in which someone pretends to be someone else by assuming that person s identity, typically in order to access resources or obtain credit and other benefits in that person s name. The victim of… … Wikipedia
Identity driven networking — (IDN) is the process of applying network controls to a network device access based on the identity of an individual or group of individuals responsible to or operating the device. Individuals are identified, and the network is tuned to respond to … Wikipedia
Identity politics — is political action to advance the interests of members of a group whose members are oppressed by virtue of a shared and marginalized identity (such as race, ethnicity, religion, gender, sexual orientation, or neurological wiring). The term has… … Wikipedia
Identity 2.0 — Identity 2.0, also called digital identity, is the anticipated revolution of identity verification on the internet using emerging user centric technologies such as Information Cards or OpenID. Identity 2.0 stems from the Web 2.0 theory of the… … Wikipedia
Identity Cards Act 2006 — The Identity Cards Act 2006[1] Parliament of the United Kingdom Long title An Act to make provision for a national scheme of registration of individuals … Wikipedia
Identity document — National identity card redirects here. For cards referred to in the English language as national identity card , see National identity card (disambiguation). An identity document (also called a piece of identification or ID, or colloquially as… … Wikipedia
Identity management — In information systems, identity management is the management of the identity life cycle of entities (subjects or objects). An identity management system: # Establishes the identity ## Links a name (or number) with the subject or object; ## Re… … Wikipedia
Social Security (United States) — This article is about the retirement/disability program. For the general concept of providing welfare, see Social security. For other uses, see Social Security (disambiguation) … Wikipedia