- authenticated user
- аутентифицированный пользователь (личность которого установлена)
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Authenticated TURN — On Demand Mail Relay (ODMR) oder Authenticated TURN (ATRN) ist eine Erweiterung für das E Mail Protokoll Simple Mail Transfer Protocol (SMTP). ODMR ist in RFC 2645 definiert. ODMR ist ein E Mail Dienst, der es Benutzern erlaubt, nach… … Deutsch Wikipedia
Authenticated Post Office Protocol — APOP ist ein optionaler Befehl für POP3, der erstmals in RFC 1460 spezifiziert wurde. Normalerweise werden die Daten für die Authentifizierung mittels der USER/PASS Befehle als Klartext übertragen. Diese Methode stellt ein großes… … Deutsch Wikipedia
Password-authenticated key agreement — In cryptography, a password authenticated key agreement method is an interactive method for two or more parties to establish cryptographic keys based on one or more party s knowledge of a password. Contents 1 Types 2 Brief history 3 See also … Wikipedia
Authentication Open Service Interface Definition — The Authentication Open Service Interface Definition (OSID) is an O.K.I. specification which supports invoking an authentication process. OSIDs are programmatic interfaces which comprise a Service Oriented Architecture for designing and building… … Wikipedia
Drupal — Drupal … Wikipedia
Mandatory access control — In computer security, mandatory access control (MAC) refers to a type of access control by which the operating system constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target.… … Wikipedia
Network Access Control — (NAC) is an approach to computer network security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security… … Wikipedia
Key distribution center — In cryptography, a key distribution center (KDC) is part of a cryptosystem intended to reduce the risks inherent in exchanging keys. KDCs often operate in systems within which some users may have permission to use certain services at some times… … Wikipedia
OpenURL — is a standardized format of Uniform Resource Locator (URL) intended to enable Internet users to more easily find a copy of a resource that they are allowed to access. Although OpenURL can be used with any kind of resource on the Internet, it is… … Wikipedia
Security Patterns — Design pattern (computer science) can be applied to achieve goals in the area of security. Every classical design pattern has different instantiations to fulfill some of the Information security goals as confidentiality, integrity or availability … Wikipedia
Backscatter (e-mail) — Backscatter (also known as outscatter, misdirected bounces, blowback or collateral spam) is a side effect of e mail spam, viruses and worms, where email servers receiving spam and other mail send bounce messages to an innocent party. This occurs… … Wikipedia