access authorization

access authorization NRT Zugangsberechtigung f, Zugriffsberechtigung f

English-German dictionary of Electrical Engineering and Electronics. 2013.

Schlagen Sie auch in anderen Wörterbüchern nach:

  • Access control — is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical… …   Wikipedia

  • Authorization — In security engineering and computer security, authorization is the concept of allowing access to resources only to those permitted to use them. More formally, authorization is a process (often part of the operating system) that protects computer …   Wikipedia

  • Authorization certificate — In computer security, an authorization certificate (also known as an attribute certificate) is a digital document that describes a written permission from the issuer to use a service or a resource that the issuer controls or has access to use.… …   Wikipedia

  • Authorization for Use of Military Force Against Terrorists — The Authorization for Use of Military Force Against Terrorists (USStatute|107|40|115|224|2001|09|18), one of two resolutions commonly known as AUMF (the other being Authorization for Use of Military Force Against Iraq Resolution of 2002 ), was a… …   Wikipedia

  • Authorization Code — A generic term that refers to a code or password that identifies the user as authorized to purchase, sell or transfer items, or to enter information into a security protected space. For example, an authorization code would be required for a… …   Investment dictionary

  • authorization — The giving of approval or permission. Authorization is central to many of the *internal controls found in modern organizations, from the making of *disbursements to the hiring of employees. Authorization can be effected through written signatures …   Auditor's dictionary

  • authorization —    The provision of rights or permissions based on identity. Authorization and authentication go hand in hand in networking; your access to services is based on your identity, and the authentication processes confirm that you are who you say you… …   Dictionary of networking

  • IBM Tivoli Access Manager — is an authentication and authorization solution for corporate web services, operating systems, and existing applications. [http://publib.boulder.ibm.com/infocenter/tivihelp/v2r1/topic/com.ibm.itame.doc/am61 admin18.htm#choverview] Tivoli Access… …   Wikipedia

  • Comparison of privilege authorization features — A number of computer operating systems employ security features to help prevent malicious software from gaining sufficient privileges to compromise the computer system. Operating systems lacking such features, such as DOS, Windows implementations …   Wikipedia

  • Multi Party Authorization — (MPA) is a process to protect a telecommunications network, data center or industrial control system from undesirable acts by a malicious insider or inexperienced technician acting alone. MPA requires that a second authorized user approve an… …   Wikipedia

  • Distributed Access Control System — DACS The Distributed Access Control System Original author(s) Developers at Distributed Systems Software Developer(s) Distributed Systems Software Stable release 1.4.26 / September 30, 2011; 14 days ago (2011 09 30) …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”

We are using cookies for the best presentation of our site. Continuing to use this site, you agree with this.