- assign permissions to users
- присвоение прав доступа пользователям
Англо-русский словарь по вычислительной технике и информационным технологиям - 4-е изд.. Сергей Орлов .
Англо-русский словарь по вычислительной технике и информационным технологиям - 4-е изд.. Сергей Орлов .
Junction table — In database management systems following the relational model, a junction table is a table that contains common fields from two or more tables. It is on the many side of a one to many relationship with each of the other tables. Junction tables… … Wikipedia
Access control list — In computer security, an access control list (ACL) is a list of permissions attached to an object. The list specifies who or what is allowed to access the object and what operations are allowed to be performed on the object. In a typical ACL,… … Wikipedia
Comparison of enterprise bookmarking platforms — The following tables compare Enterprise bookmarking platforms. Contents 1 General 2 Date and content types 3 Content enrichment capabilities 4 Tag management capabilities … Wikipedia
Active Worlds — Developer(s) Active Worlds, Inc. Publisher(s) … Wikipedia
Adobe Contribute — Infobox Software name = Adobe Contribute caption = Adobe Contribute CS3 developer = Adobe Systems released = 2003 by Macromedia [http://www.adobe.com/macromedia/ir/macr/financials/sec/10k mar31 2003.pdf] latest release version = CS4 latest… … Wikipedia
Defense Technical Information Center — Department overview Headquarters Fort Belvoir, Virginia … Wikipedia
Mobile operating system — A mobile operating system, also known as a mobile OS, mobile software platform or a handheld operating system, is the operating system that controls a mobile device or information appliance similar in principle to an operating system such as… … Wikipedia
Access control — is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical… … Wikipedia
Role-based access control — In computer systems security, role based access control (RBAC) [cite conference author = Ferraiolo, D.F. and Kuhn, D.R. title = Role Based Access Control booktitle=15th National Computer Security Conference year = 1992 month = October pages=554… … Wikipedia
Active Directory — (AD) is a directory service created by Microsoft for Windows domain networks. It is included in most Windows Server operating systems. Server computers on which Active Directory is running are called domain controllers. Active Directory serves as … Wikipedia
Mandatory access control — In computer security, mandatory access control (MAC) refers to a type of access control by which the operating system constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target.… … Wikipedia