Access control — is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical… … Wikipedia
access control — UK US noun [C or U] ► WORKPLACE ways of controlling who can enter a building or area, usually involving electronic technology: »The buildings are secured with an access control system. ► IT ways of controlling who can see or enter information on… … Financial and business terms
Access control list — In computer security, an access control list (ACL) is a list of permissions attached to an object. The list specifies who or what is allowed to access the object and what operations are allowed to be performed on the object. In a typical ACL,… … Wikipedia
access control list — noun A security scheme for file level security (as opposed to traditional user, group levels, or the somewhat stricter role levels.) Abbreviated ACL. The hackers broke through the B security model, so no more role level security; all critical… … Wiktionary
Mandatory access control — In computer security, mandatory access control (MAC) refers to a type of access control by which the operating system constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target.… … Wikipedia
Media access control — The OSI model 7 Application layer 6 Presentation layer 5 Session layer 4 Transport layer 3 Network layer 2 … Wikipedia
Media Access Control — The Media Access Control (MAC) data communication protocol sub layer, also known as the Medium Access Control, is a sublayer of the Data Link Layer specified in the seven layer OSI model (layer 2). It provides addressing and channel access… … Wikipedia
Distributed Access Control System — DACS The Distributed Access Control System Original author(s) Developers at Distributed Systems Software Developer(s) Distributed Systems Software Stable release 1.4.26 / September 30, 2011; 14 days ago (2011 09 30) … Wikipedia
Role-based access control — In computer systems security, role based access control (RBAC) [cite conference author = Ferraiolo, D.F. and Kuhn, D.R. title = Role Based Access Control booktitle=15th National Computer Security Conference year = 1992 month = October pages=554… … Wikipedia
Network Access Control — (NAC) is an approach to computer network security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security… … Wikipedia
Context-based access control — (CBAC) intelligently filters TCP and UDP packets based on application layer protocol session information and can be used for intranets, extranets and internets. CBAC can be configured to permit specified TCP and UDP traffic through a firewall… … Wikipedia