access control - определение. Что такое access control
Diclib.com
Словарь ChatGPT
Введите слово или словосочетание на любом языке 👆
Язык:

Перевод и анализ слов искусственным интеллектом ChatGPT

На этой странице Вы можете получить подробный анализ слова или словосочетания, произведенный с помощью лучшей на сегодняшний день технологии искусственного интеллекта:

  • как употребляется слово
  • частота употребления
  • используется оно чаще в устной или письменной речи
  • варианты перевода слова
  • примеры употребления (несколько фраз с переводом)
  • этимология

Что (кто) такое access control - определение

SELECTIVE RESTRICTION OF ACCESS TO A PLACE OR OTHER RESOURCE, ALLOWING ONLY AUTHORIZED USERS
Access Control; Access controls; Access control system; Access Control Systems; Physical access control; Access control protocol; Subject (access control); Authentication in web; Access policy; Personal access control system; Vehicle access control system; Electronic access control
  • Common physical security access control with a finger print.
  • Typical access control door wiring
  • Access control door wiring when using intelligent readers and IO module
  • Access control system using IP controllers
  • Access control system using network-enabled main controllers
  • Access control system using IP readers
  • Access control system using serial main and sub-controllers
  • Access control system using serial main controller and intelligent readers
  • Access control system using serial controllers
  • Access control systems using serial controllers and terminal servers
  • Example of fob based access control using an ACT reader
  • Access control door wiring when using intelligent readers
  • Various control system components
  • Underground entrance to the [[New York City Subway]] system
  • Physical security access control with a [[hand geometry]] scanner
  • Drop Arm Optical Turnstiles Manufactured by Q-Lane Turnstiles LLc
  • A sailor checks an identification card (ID) before allowing a vehicle to enter a military installation.
Найдено результатов: 3566
Media Access Control         
SERVICE LAYER IN IEEE 802 NETWORK STANDARDS
Medium access control sublayer; Medium access controller; MAC layer; Medium Access Control; MAC sublayer; MAC protocol; Media Access Control; Media access control sublayer; Media access control; Media access controller
<networking> (MAC) The lower sublayer of the OSI {data link layer}. The interface between a node's {Logical Link Control} and the network's physical layer. The MAC differs for various physical media. See also MAC Address, Ethernet, IEEE 802.3, token ring. [What does it do? Examples?] (1996-01-29)
Medium access control         
SERVICE LAYER IN IEEE 802 NETWORK STANDARDS
Medium access control sublayer; Medium access controller; MAC layer; Medium Access Control; MAC sublayer; MAC protocol; Media Access Control; Media access control sublayer; Media access control; Media access controller
In IEEE 802 LAN/MAN standards, the medium access control (MAC, also called media access control) sublayer is the layer that controls the hardware responsible for interaction with the wired, optical or wireless transmission medium. The MAC sublayer and the logical link control (LLC) sublayer together make up the data link layer.
Medium Access Control         
SERVICE LAYER IN IEEE 802 NETWORK STANDARDS
Medium access control sublayer; Medium access controller; MAC layer; Medium Access Control; MAC sublayer; MAC protocol; Media Access Control; Media access control sublayer; Media access control; Media access controller
Discretionary access control         
LOGICAL ACCESS CONTROL BY RESTRICTING ACCESS TO OBJECTS BASED ON THE IDENTITY OF SUBJECTS OR THEIR BELONGING GROUPS
Discretionary Access Control; DACL
In computer security, discretionary access control (DAC) is a type of access control defined by the Trusted Computer System Evaluation Criteria
Extended Access Control         
SET OF ADVANCED SECURITY FEATURES FOR ELECTRONIC PASSPORTS
Extended access control; Extended access control (ePassports)
Extended Access Control (EAC) is a set of advanced security features for electronic passports that protects and restricts access to sensitive personal data contained in the RFID chip. In contrast to common personal data (like the bearer's photograph, names, date of birth, etc.
Context-based access control         
TERM IN NETWORK TECHNOLOGY
Context-Based Access Control
Context-based access control (CBAC) is a feature of firewall software, which intelligently filters TCP and UDP packets based on application layer protocol session information. It can be used for intranets, extranets and internets.
Network Access Control         
PIECE OF TECHNOLOGY THAT CONTROLS ACCESS TO A NETWORK
Network access control
Network access control (NAC) is an approach to computer security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security enforcement.Tutorial: Network Access Control (NAC) Mike Fratto, Network Computing, July 17, 2007
Mandatory access control         
TYPE OF ACCESS CONTROL
Mandatory Access Control; Mandatory access controls
In computer security, mandatory access control (MAC) refers to a type of access control by which the operating system or database constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target. In the case of operating systems, a subject is usually a process or thread; objects are constructs such as files, directories, TCP/UDP ports, shared memory segments, IO devices, etc.
Access control expression         
LIST OF BOOLEAN EXPRESSIONS ATTACHED TO A FILE OBJECT
Access Control Expressions
An access control expression with respect to a computer file system is a list of Boolean expressions attached to a file object. An access control expression specifies a Boolean formula that defines which users or system processes are granted access to objects, as well as what operations are allowed on given objects.
Access control matrix         
SECURITY MODEL OF PROTECTION STATE IN COMPUTER SYSTEMS
The Access Matrix; Access matrix; Access matrix model; Access Control Matrix
In computer science, an access control matrix or access matrix is an abstract, formal security model of protection state in computer systems, that characterizes the rights of each subject with respect to every object in the system. It was first introduced by Butler W.

Википедия

Access control

In physical security and information security, access control (AC) is the selective restriction of access to a place or other resource, while access management describes the process. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.

Locks and login credentials are two analogous mechanisms of access control.