- authentication control function
- функциональный объект управления процедурой аутентификации
Англо-русский словарь по вычислительной технике и информационным технологиям - 4-е изд.. Сергей Орлов .
Англо-русский словарь по вычислительной технике и информационным технологиям - 4-е изд.. Сергей Орлов .
Access control — is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical… … Wikipedia
Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in … Wikipedia
Message authentication code — In cryptography, a message authentication code (often MAC) is a short piece of information used to authenticate a message. A MAC algorithm, sometimes called a keyed (cryptographic) hash function, accepts as input a secret key and an arbitrary… … Wikipedia
Challenge-response authentication — For the spam filtering technique, see Challenge response spam filtering. For other uses, see CRAM (disambiguation). In computer security, challenge response authentication is a family of protocols in which one party presents a question (… … Wikipedia
Distributed Access Control System — DACS The Distributed Access Control System Original author(s) Developers at Distributed Systems Software Developer(s) Distributed Systems Software Stable release 1.4.26 / September 30, 2011; 14 days ago (2011 09 30) … Wikipedia
Lexmark Int'l v. Static Control Components — Infobox Court Case name = Lexmark Int l v. Static Control Components court = United States Court of Appeals for the Sixth Circuit date decided = October 26, 2004 full name = Lexmark International, Inc. v. Static Control Components, Inc. citations … Wikipedia
E-mail authentication — is the effort to equip messages of the e mail transport system with enough verifiable information, so that recipients can recognize the nature of each incoming message automatically. It is different from content filtering s fuzzy methods.… … Wikipedia
Challenge-Handshake Authentication Protocol — In computing, the Challenge Handshake Authentication Protocol (CHAP) authenticates a user or network host to an authenticating entity. That entity may be, for example, an Internet service provider. CHAP is specified in RFC 1994. CHAP provides… … Wikipedia
Orchestra Control Engine — is a suite of software components (based on Linux/RTAI) for the planning, development and deployment of real time control applications for industrial machines and robots. Orchestra Control Engine has been developed by Sintesi SpA in collaboration … Wikipedia
Internet Group Management Protocol with Access Control (IGMP-AC) — The Internet Group Management Protocol with Access Control (IGMP AC) has been designed for incorporating AAA functionalities in the existing IP multicast model. It will enforce authentication and authorization of an end user or receiver before… … Wikipedia
Role-based access control — In computer systems security, role based access control (RBAC) [cite conference author = Ferraiolo, D.F. and Kuhn, D.R. title = Role Based Access Control booktitle=15th National Computer Security Conference year = 1992 month = October pages=554… … Wikipedia