- attribute-based access control
- управление доступом на основе атрибутов (на уровне атрибутов)
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Role-based access control — In computer systems security, role based access control (RBAC) [cite conference author = Ferraiolo, D.F. and Kuhn, D.R. title = Role Based Access Control booktitle=15th National Computer Security Conference year = 1992 month = October pages=554… … Wikipedia
Control table — This simple control table directs program flow according to the value of the single input variable. Each table entry holds a possible input value to be tested for equality (implied) and a relevant subroutine to perform in the action column. The… … Wikipedia
Lightweight Directory Access Protocol — The Lightweight Directory Access Protocol (LDAP; /ˈɛld … Wikipedia
Diameter Credit-Control Application — Diameter Credit Control Application, is a networking protocol for Diameter application used to implement real time credit control for a variety of end user services. It is an IETF standard defined in RFC 4006. Contents 1 Purpose 1.1 Session based … Wikipedia
Class-based programming — Programming paradigms Agent oriented Automata based Component based Flow based Pipelined Concatenative Concurrent computin … Wikipedia
Comparison of revision control software — The following is a comparison of revision control software. The following tables includes general and technical information for notable revision control and software configuration management (SCM) software. This is an incomplete list, which may… … Wikipedia
Illinois Security Lab — The Illinois Security Lab is a research laboratory at the University of Illinois Urbana Champaign established in 2004 to support research and education in computer and network security. The lab is part of the UIUC Computer Science Department and… … Wikipedia
IBM Tivoli Access Manager — is an authentication and authorization solution for corporate web services, operating systems, and existing applications. [http://publib.boulder.ibm.com/infocenter/tivihelp/v2r1/topic/com.ibm.itame.doc/am61 admin18.htm#choverview] Tivoli Access… … Wikipedia
PERMIS — (PrivilEge and Role Management Infrastructure Standards) is a sophisticated policy based authorisation system that implements an enhanced version of the U.S. National Institute of Standards and Technology (NIST) standard Role Based Access Control … Wikipedia
Identity correlation — Definition In information systems, identity correlation is a process that reconciles and validates the proper ownership of disparate user account login IDs (user names) that reside on systems and applications throughout an organization and can… … Wikipedia
RSBAC — (Rule Set Based Access Control) is an open source access control framework for current Linux kernels, which has been in stable production use since January 2000 (version 1.0.9a). Features*Free open source (GPL) Linux kernel security extension.… … Wikipedia