Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

Longer titles found: Access control expression (view), Access control matrix (view), Medium access control (view), Computer access control (view), Role-based access control (view), Mandatory access control (view), Network access control (view), Context-based access control (view), Discretionary access control (view), Resource Access Control Facility (view), Attribute-based access control (view), Lattice-based access control (view), Basic access control (view), Mantrap (access control) (view), Extended Access Control (view), Internet Group Management Protocol with Access Control (view), Organisation-based access control (view), Graph-based access control (view), VLAN access control list (view), Access Control Service (view), Distributed Access Control System (view), Relationship-based access control (view)

searching for Access control 258 found (2168 total)

alternate case: access control

Time-based one-time password (649 words) [view diff] no match in snippet view article find links to article

Time-based one-time password (TOTP) is a computer algorithm that generates a one-time password (OTP) using the current time as a source of uniqueness.
Wiki (5,631 words) [view diff] exact match in snippet view article find links to article
adding, or removing material. Others may permit access without enforcing access control. Further rules may be imposed to organize content. In addition to hosting
Cross-origin resource sharing (1,503 words) [view diff] no match in snippet view article find links to article
Origin Host Access-Control-Request-Method Access-Control-Request-Headers Access-Control-Allow-Origin Access-Control-Allow-Credentials Access-Control-Expose-Headers
Authority control (3,222 words) [view diff] exact match in snippet view article find links to article
ideology. An alternative to using authorized headings is the idea of access control, where various forms of a name are related without the endorsement of
Chmod (1,529 words) [view diff] exact match in snippet view article find links to article
same name as the command, chmod(), provides access to the underlying access control data. The command exposes the capabilities of the system call to a shell
IEEE 802.3 (362 words) [view diff] exact match in snippet view article find links to article
of standards defining the physical layer and data link layer's media access control (MAC) of wired Ethernet. The standards are produced by the working group
Authentication protocol (1,192 words) [view diff] no match in snippet view article find links to article
An authentication protocol is a type of computer communications protocol or cryptographic protocol specifically designed for transfer of authentication
IEEE 802.11i-2004 (1,586 words) [view diff] exact match in snippet view article find links to article
group key handshake. These utilize the authentication services and port access control described in IEEE 802.1X to establish and change the appropriate cryptographic
Apache Shiro (575 words) [view diff] no match in snippet view article find links to article
Apache Shiro (pronounced "sheeroh", a Japanese word for castle (Japanese: 城)) is an open source software security framework that performs authentication
IndieAuth (226 words) [view diff] no match in snippet view article find links to article
IndieAuth is an open standard decentralized authentication protocol that uses OAuth 2.0 and enables services to verify the identity of a user represented
Federated identity (1,426 words) [view diff] no match in snippet view article find links to article
A federated identity in information technology is the means of linking a person's electronic identity and attributes, stored across multiple distinct identity
Regin (malware) (1,128 words) [view diff] no match in snippet view article
Regin (also known as Prax or QWERTY) is a sophisticated malware and hacking toolkit used by United States' National Security Agency (NSA) and its British
Linux PAM (325 words) [view diff] no match in snippet view article find links to article
Linux Pluggable Authentication Modules (PAM) is a suite of libraries that allow a Linux system administrator to configure methods to authenticate users
IEC 62351 (474 words) [view diff] exact match in snippet view article find links to article
Role-based access control. Covers the access control of users and automated agents to data objects in power systems by means of role-based access control (RBAC)
ISO/IEC 27002 (1,923 words) [view diff] case mismatch in snippet view article find links to article
Organization of Information Security Human Resource Security Asset Management Access Control Cryptography Physical and environmental security Operation Security-
U-Prove (509 words) [view diff] no match in snippet view article find links to article
U-Prove is a free and open-source technology and accompanying software development kit for user-centric identity management. The underlying cryptographic
Structured Financial Messaging System (375 words) [view diff] exact match in snippet view article find links to article
architecture facilitating centralised or distributed deployment. The access control is through Smart Card based user access and messages are secured by
Real estate in Puerto Rico (1,378 words) [view diff] case mismatch in snippet view article find links to article
can achieve healthy living and community interaction. The concept of Access Control implies that the public nature of residential streets is preserved,
Account verification (1,715 words) [view diff] no match in snippet view article find links to article
Account verification is the process of verifying that a new or existing account is owned and operated by a specified real individual or organization. A
Windows Resource Protection (671 words) [view diff] exact match in snippet view article find links to article
Resource Protection works by setting discretionary access control lists (DACLs) and access control lists (ACLs) defined for protected resources. Permission
Shamoon (1,964 words) [view diff] no match in snippet view article find links to article
Shamoon (Persian: شمعون), also known as W32.DistTrack, is a modular computer virus that was discovered in 2012, targeting then-recent 32-bit NT kernel
Integrated Windows Authentication (892 words) [view diff] no match in snippet view article find links to article
Integrated Windows Authentication (IWA) is a term associated with Microsoft products that refers to the SPNEGO, Kerberos, and NTLMSSP authentication protocols
List of HTTP header fields (2,491 words) [view diff] exact match in snippet view article find links to article
Forbidden 404 Not Found 451 Unavailable for Legal Reasons Security access control methods Basic access authentication Digest access authentication Security
BACnet (1,149 words) [view diff] exact match in snippet view article find links to article
ventilating, and air-conditioning control (HVAC), lighting control, access control, and fire detection systems and their associated equipment. The BACnet
Inner Ring Road, Bengaluru (314 words) [view diff] exact match in snippet view article find links to article
Rajanukunte and Madure these 14 towns connected. This road 8 lane access control highway and 2 lane service road facility provided. arterial road in
Tables (Google) (934 words) [view diff] no match in snippet view article
Tables is a collaborative database program developed out of Google's Area 120 incubator. Tables is available as a web application. The app allows users
System File Checker (1,224 words) [view diff] exact match in snippet view article find links to article
Resource Protection (WRP) works by setting discretionary access-control lists (DACLs) and access control lists (ACLs) defined for protected resources. If any
Database audit (154 words) [view diff] no match in snippet view article find links to article
Database auditing involves observing a database to be aware of the actions of database users. Database administrators and consultants often set up auditing
WiMAX (6,012 words) [view diff] exact match in snippet view article find links to article
802.16 set of standards, which provide physical layer (PHY) and media access control (MAC) options. The WiMAX Forum was formed in June 2001 to promote conformity
Malaysian Federal Roads System (2,268 words) [view diff] exact match in snippet view article find links to article
FELDA settlements with no access control and low speed limits) to R5 (federal roads or highways with limited access control and speed limits up to 90 km/h)
Labohan Dagang–Nilai Route (176 words) [view diff] exact match in snippet view article find links to article
the JKR R5 road standard as a dual-carriageway highway with partial access control, with a speed limit of 90 km/h. There are no overlaps, alternate routes
IEEE 1901 (2,547 words) [view diff] case mismatch in snippet view article find links to article
state-of the art authentication and authorization mechanisms to the Medium Access Control (MAC) layer using IEEE Std 802.1X, providing secure, interoperable communication
IEEE P802.1p (377 words) [view diff] exact match in snippet view article find links to article
a mechanism for implementing quality of service (QoS) at the media access control (MAC) level. Although this technique is commonly referred to as IEEE
IEC 60870-6 (1,896 words) [view diff] no match in snippet view article find links to article
IEC 60870 part 6 in electrical engineering and power system automation, is one of the IEC 60870 set of standards which define systems used for telecontrol
SIM card (6,924 words) [view diff] no match in snippet view article find links to article
A SIM card or SIM (subscriber identity module) is an integrated circuit (IC) intended to securely store an international mobile subscriber identity (IMSI)
HackingTeam (3,156 words) [view diff] no match in snippet view article find links to article
Hacking Team was a Milan-based information technology company that sold offensive intrusion and surveillance capabilities to governments, law enforcement
Electronic business (3,426 words) [view diff] no match in snippet view article find links to article
Electronic business (also known as online business or e-business) is any kind of business or commercial activity that includes sharing information across
Security token (2,611 words) [view diff] no match in snippet view article find links to article
A security token is a peripheral device used to gain access to an electronically restricted resource. The token is used in addition to, or in place of
Web portal (2,351 words) [view diff] exact match in snippet view article find links to article
enterprises and organizations to provide a consistent "look and feel" with access control and procedures for multiple applications and databases, which otherwise
FinFisher (3,047 words) [view diff] no match in snippet view article find links to article
FinFisher, also known as FinSpy, is surveillance software marketed by Lench IT Solutions plc, which markets the spyware through law enforcement channels
File archiver (489 words) [view diff] exact match in snippet view article find links to article
stores additional metadata, such as the timestamps, file attributes and access control information. An archiver might compress input file content to reduce
Armored car (valuables) (1,347 words) [view diff] no match in snippet view article
An armored vehicle (also known as an armored cash transport car, security van, or armored truck) is an armored van or truck used to transport valuables
Business rules engine (1,515 words) [view diff] exact match in snippet view article find links to article
standardized access control to applications. OASIS defines a rules engine architecture and standard dedicated to access control called XACML (eXtensible Access Control
Armored car (valuables) (1,347 words) [view diff] no match in snippet view article
An armored vehicle (also known as an armored cash transport car, security van, or armored truck) is an armored van or truck used to transport valuables
OpenPAM (236 words) [view diff] no match in snippet view article find links to article
Free and open-source software portal OpenPAM is a BSD-licensed implementation of PAM used by FreeBSD, NetBSD, DragonFly BSD and macOS (starting with Snow
Swift (programming language) (7,948 words) [view diff] exact match in snippet view article
callAsFunction(4, scale: 2) // Both function calls print 208. Swift supports five access control levels for symbols: open, public, internal, fileprivate, and private
Challenge–response authentication (1,540 words) [view diff] no match in snippet view article find links to article
In computer security, challenge-response authentication is a family of protocols in which one party presents a question ("challenge") and another party
PmWiki (1,942 words) [view diff] exact match in snippet view article find links to article
features that support collaborative editing with built-in tools for access control, delegation, monitoring, review, and edit reversion. PmWiki's design
JSON Web Token (1,556 words) [view diff] no match in snippet view article find links to article
JSON Web Token (JWT, suggested pronunciation /dʒɒt/, same as the word "jot") is a proposed Internet standard for creating data with optional signature
Personal identification number (2,753 words) [view diff] exact match in snippet view article find links to article
uses. In common usage, PINs are used in ATM or PO transactions, secure access control (e.g. computer access, door access, car access), internet transactions
Crew rest compartment (452 words) [view diff] exact match in snippet view article find links to article
example the European Aviation Safety Agency (EASA) regulations for access control, communications, and signage are similar to those of the FAA's. By following
ESIM (1,715 words) [view diff] no match in snippet view article find links to article
An eSIM (embedded SIM) is a form of SIM card that is embedded directly into a device as software installed onto a eUICC chip. First released in March 2016
Security management (955 words) [view diff] no match in snippet view article find links to article
Security management is the identification of an organization's assets i.e. including people, buildings, machines, systems and information assets, followed
SQL (4,009 words) [view diff] exact match in snippet view article find links to article
delete), data definition (schema creation and modification), and data access control. Although SQL is essentially a declarative language (4GL), it also includes
JSON Web Signature (432 words) [view diff] no match in snippet view article find links to article
A JSON Web Signature (abbreviated JWS) is an IETF-proposed standard (RFC 7515) for signing arbitrary data. This is used as the basis for a variety of web-based
Git (7,265 words) [view diff] exact match in snippet view article find links to article
Git does not provide access-control mechanisms, but was designed for operation with other tools that specialize in access control. On 17 December 2014
Bolloré (1,975 words) [view diff] exact match in snippet view article find links to article
forwarding, oil storage and pipelines in France, solid state batteries, access control systems for buildings, palm oil and rubber in Asia and Africa, olive
Keinawa Expressway (420 words) [view diff] exact match in snippet view article find links to article
north–south (physically northeast–southwest) National Highway with access control (一般国道自動車専用道路 Ippan-kokudō jidōsha-sen-yō-dōro) in the Kinki region of
Solid (web decentralization project) (1,093 words) [view diff] exact match in snippet view article
is to allow users to have full control of their own data, including access control and storage location. To that end, Tim Berners-Lee formed a company
Smart ring (883 words) [view diff] exact match in snippet view article find links to article
traditional jewelry ring, can offer functionalities like mobile payments, access control, gesture control, and activity tracking. Their most common feature is
IEEE 802.2 (1,422 words) [view diff] exact match in snippet view article find links to article
connectionless mode services (optional). The LLC uses the services of the media access control (MAC), which is dependent on the specific transmission medium (Ethernet
Wiki.js (416 words) [view diff] no match in snippet view article find links to article
Wiki.js is a wiki engine running on Node.js and written in JavaScript. It is free software released under the Affero GNU General Public License. It is
User identifier (1,477 words) [view diff] exact match in snippet view article find links to article
ID or UID. The UID, along with the group identifier (GID) and other access control criteria, is used to determine which system resources a user can access
Audio Video Bridging (2,038 words) [view diff] case mismatch in snippet view article find links to article
base IEEE 802.1Q-2011 document, which specifies the operation of Media Access Control (MAC) Bridges and Virtual Bridged Local Area Networks. AVB was initially
Industrial Ethernet (712 words) [view diff] exact match in snippet view article find links to article
Modbus TCP. Many industrial Ethernet protocols use a modified media access control (MAC) layer to provide low latency and determinism. Some microprocessors
Streaming television (6,061 words) [view diff] no match in snippet view article find links to article
Streaming television is the digital distribution of television content, such as films and television series, streamed over the Internet. Standing in contrast
Flickr (6,774 words) [view diff] no match in snippet view article find links to article
Flickr (/ˈflɪkər/ FLIK-ər) is an image and video hosting service, as well as an online community, founded in Canada and headquartered in the United States
Comparison of wiki software (1,637 words) [view diff] exact match in snippet view article find links to article
Page Access Control: Some wiki engines allow (optional) read/write access restriction to users or user groups on a per-page basis (e.g. through Access control
Digest access authentication (2,879 words) [view diff] exact match in snippet view article find links to article
Forbidden 404 Not Found 451 Unavailable for Legal Reasons Security access control methods Basic access authentication Digest access authentication Security
Industrial Ethernet (712 words) [view diff] exact match in snippet view article find links to article
Modbus TCP. Many industrial Ethernet protocols use a modified media access control (MAC) layer to provide low latency and determinism. Some microprocessors
IRC services (1,256 words) [view diff] exact match in snippet view article find links to article
usually implement some sort of login system so that only people on the access control list can obtain these services. The most popular style of services uses
Digest access authentication (2,879 words) [view diff] exact match in snippet view article find links to article
Forbidden 404 Not Found 451 Unavailable for Legal Reasons Security access control methods Basic access authentication Digest access authentication Security
See Tickets (714 words) [view diff] exact match in snippet view article find links to article
clients include custom UX and UI development, marketing, customer care, access control and all aspects of ticketing and account management. See Tickets' global
TWiki (1,083 words) [view diff] exact match in snippet view article find links to article
trail, also for meta data such as attachments and access control settings Fine-grained access control - restrict read/write/rename on site level, web level
Google Cloud Storage (727 words) [view diff] exact match in snippet view article find links to article
requests are authorized using Identity and Access Management policies or access control lists associated with a user or service account. Bucket names and keys
MUSIC/SP (1,252 words) [view diff] exact match in snippet view article find links to article
4300-series mainframe hardware, and offered then-novel features such as file access control and data compression. It was designed to allow academics and students
Crypt (C) (3,039 words) [view diff] no match in snippet view article
crypt is a POSIX C library function. It is typically used to compute the hash of user account passwords. The function outputs a text string which also
X Window authorization (776 words) [view diff] exact match in snippet view article find links to article
from the one who is logged in is necessary. There are five standard access control mechanisms that control whether a client application can connect to
SQL:1999 (722 words) [view diff] no match in snippet view article find links to article
SQL:1999 (also called SQL 3) was the fourth revision of the SQL database query language. It introduced many new features, many of which required clarifications
FUJITSU Cloud IaaS Trusted Public S5 (1,437 words) [view diff] case mismatch in snippet view article find links to article
Azure, and Windows Azure AppFabric technologies such as Service Bus and Access Control Service, with options for interoperating services covering implementation
Common Criteria (3,769 words) [view diff] exact match in snippet view article find links to article
maintains a list of certified products, including operating systems, access control systems, databases, and key management systems. Common Criteria evaluations
Remote Utilities (736 words) [view diff] no match in snippet view article find links to article
Remote Utilities is a remote desktop software that allows a user to remotely control another computer through a proprietary protocol and see the remote
Data loss prevention software (1,443 words) [view diff] exact match in snippet view article find links to article
standard security measures, advanced/intelligent security measures, access control and encryption and designated DLP systems, although only the latter
Open (system call) (1,135 words) [view diff] exact match in snippet view article
access, as restricted by permission flags within the file meta data or access control list, is validated against the requested type of operations. This usually
Crowne Plaza Liverpool John Lennon Airport Hotel (424 words) [view diff] exact match in snippet view article find links to article
although it is no longer connected to the airport or subject to airside access control. It is the home of several aircraft, including BAe Jetstream 41 prototype
Web Calendar Access Protocol (503 words) [view diff] no match in snippet view article find links to article
<X-NSCP-CALPROPS-ACCESS-CONTROL-ENTRY>@@o^c^WDEIC^g</X-NSCP-CALPROPS-ACCESS-CONTROL-ENTRY> <X-NSCP-CALPROPS-ACCESS-CONTROL-ENTRY>@@o^a^RSF^g</X-NSCP-CALPROPS-ACCESS-CONTROL-ENTRY>
IEEE 802.11e-2005 (2,208 words) [view diff] exact match in snippet view article find links to article
enhancements for wireless LAN applications through modifications to the media access control (MAC) layer. The standard is considered of critical importance for delay-sensitive
Mutual authentication (3,032 words) [view diff] no match in snippet view article find links to article
Mutual authentication or two-way authentication (not to be confused with two-factor authentication) refers to two parties authenticating each other at
Self-sovereign identity (1,392 words) [view diff] no match in snippet view article find links to article
Self-sovereign identity (SSI) is an approach to digital identity that gives individuals control over the information they use to prove who they are to
IEEE 802.11k-2008 (390 words) [view diff] case mismatch in snippet view article find links to article
metropolitan area networks--Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. 1 November 2012. pp. 1–2798
Crime prevention through environmental design (4,330 words) [view diff] exact match in snippet view article find links to article
to a detailed study of specific topics such as natural surveillance, access control, and territoriality. The "broken window" principle, that neglected zones
OASIS (organization) (2,376 words) [view diff] case mismatch in snippet view article
of emergency-related organizations GeoXACML — Geospatial eXtensible Access Control Markup Language, a geo-specific extension to XACML Version 2.0, mainly
Managed lane (3,899 words) [view diff] exact match in snippet view article find links to article
of three categories. These include pricing, vehicle eligibility, and access control. Most managed lane implementation incorporate the application of multiple
Secure attention key (414 words) [view diff] no match in snippet view article find links to article
A secure attention key (SAK), special attention key, or secure attention sequence (SAS) is a special key, key combination or sequence to be pressed on
Forwarding information base (1,287 words) [view diff] no match in snippet view article find links to article
filtering. Though the simplest form of ingress filtering is to use access-control lists to drop packets with improper source addresses, the use of access
SMTP Authentication (1,229 words) [view diff] no match in snippet view article find links to article
SMTP Authentication, often abbreviated SMTP AUTH, is an extension of the Simple Mail Transfer Protocol (SMTP) whereby a client may log in using any authentication
Digital Ocean (2,170 words) [view diff] exact match in snippet view article find links to article
contracts with AT&T/Lucent and Aironet to license Digital Ocean's media access control (MAC) chipset technology in return for access to AT&T/Lucent's semiconductor
Universal 2nd Factor (1,477 words) [view diff] no match in snippet view article find links to article
Universal 2nd Factor (U2F) is an open standard that strengthens and simplifies two-factor authentication (2FA) using specialized Universal Serial Bus (USB)
Law enforcement in the Marshall Islands (706 words) [view diff] case mismatch in snippet view article find links to article
employees, Alutiiq still remains on Kwajalein, as the “Security and Access Control Contractor”, providing security guard patrols, Customs/TSA services
Wake-on-LAN (4,136 words) [view diff] exact match in snippet view article find links to article
technology on enterprise networks can sometimes conflict with network access control solutions such as 802.1X MAC-based authentication, which may prevent
MAC spoofing (1,345 words) [view diff] case mismatch in snippet view article find links to article
MAC spoofing is a technique for changing a factory-assigned Media Access Control (MAC) address of a network interface on a networked device. The MAC address
HMAC-based one-time password (1,061 words) [view diff] no match in snippet view article find links to article
HMAC-based one-time password (HOTP) is a one-time password (OTP) algorithm based on HMAC. It is a cornerstone of the Initiative for Open Authentication
Expressways of India (3,517 words) [view diff] exact match in snippet view article find links to article
highways may or may not be divided by a median and may or may not have access control. Some highways, built by State Governments, which may be fully access
Identity provider (308 words) [view diff] no match in snippet view article find links to article
An identity provider (abbreviated IdP or IDP) is a system entity that creates, maintains, and manages identity information for principals and also provides
MAC flooding (622 words) [view diff] exact match in snippet view article find links to article
In computer networking, a media access control attack or MAC flooding is a technique employed to compromise the security of network switches. The attack
Security question (686 words) [view diff] no match in snippet view article find links to article
A security question is a form of shared secret used as an authenticator. It is commonly used by banks, cable companies and wireless providers as an extra
Confused deputy problem (1,220 words) [view diff] no match in snippet view article find links to article
Capability systems protect against the confused deputy problem, whereas access-control list–based systems do not. In the original example of a confused deputy
X-Forwarded-For (744 words) [view diff] exact match in snippet view article find links to article
Forbidden 404 Not Found 451 Unavailable for Legal Reasons Security access control methods Basic access authentication Digest access authentication Security
Sensitive compartmented information (1,537 words) [view diff] exact match in snippet view article find links to article
methods, or analytical processes. All SCI must be handled within formal access control systems established by the Director of National Intelligence. SCI is
Virtual security switch (850 words) [view diff] exact match in snippet view article find links to article
security technologies. Unlike physical networks that have switches with access control lists (ACLs), firewalls, antivirus gateways, or intrusion prevention
Message authentication code (1,918 words) [view diff] exact match in snippet view article find links to article
communications to distinguish it from the use of the latter as media access control address (MAC address). However, some authors use MIC to refer to a message
Initiative for Open Authentication (168 words) [view diff] no match in snippet view article find links to article
Initiative for Open Authentication (OATH) is an industry-wide collaboration to develop an open reference architecture using open standards to promote the
Road hierarchy (4,349 words) [view diff] exact match in snippet view article find links to article
geometric and operational characteristics, such as lane configuration and access control, and does not always form a strict hierarchy. While conceptually distinct
Fares and ticketing on the Mass Rapid Transit (Singapore) (3,118 words) [view diff] exact match in snippet view article
fares by restricting entry only through the fare gates, also known as access control gates. These gates, connected to a computer network, are able to read
Time-Sensitive Networking (7,130 words) [view diff] case mismatch in snippet view article find links to article
endeavour since the technology required both changes in the Ethernet Media Access Control (MAC) scheme that is under the control of IEEE 802.3, as well as changes
Digital identity (5,785 words) [view diff] no match in snippet view article find links to article
A digital identity is data stored on computer systems relating to an individual, organization, application, or device. For individuals, it involves the
HTTP 404 (1,945 words) [view diff] exact match in snippet view article find links to article
Forbidden 404 Not Found 451 Unavailable for Legal Reasons Security access control methods Basic access authentication Digest access authentication Security
Software token (567 words) [view diff] exact match in snippet view article find links to article
Ian T.; Clark, Russ; Owen, Henry (2018-02-01). "Advance reservation access control using software-defined networking and tokens". Future Generation Computer
Cloud management (2,329 words) [view diff] exact match in snippet view article find links to article
include configuration and installation of images, access control, and budgeting and reporting. Access control often includes the use of Single sign-on (SSO)
IEEE 802.11 (legacy mode) (988 words) [view diff] case mismatch in snippet view article
Metropolitan Area Networks- Specific Requirements Part Ii: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. (n.d.). doi:10.1109/ieeestd
WS-Federation (121 words) [view diff] no match in snippet view article find links to article
WS-Federation (Web Services Federation) is an Identity Federation specification, developed by a group of companies: BEA Systems, BMC Software, CA Inc.
Transaction authentication number (1,996 words) [view diff] no match in snippet view article find links to article
A transaction authentication number (TAN) is used by some online banking services as a form of single use one-time passwords (OTPs) to authorize financial
Spring Security (819 words) [view diff] exact match in snippet view article find links to article
choice of Apache Ant paths or regular expressions. Used for specifying access control lists applicable to domain objects. Spring Security offers a repository
Dainfern (397 words) [view diff] exact match in snippet view article find links to article
trails and play parks. Security measures include 24/7 patrols, CCTV and access control. Dainfern publishes "In Focus", a monthly magazine exclusive to the
Service set (802.11 network) (2,086 words) [view diff] case mismatch in snippet view article
11-2007, § 7.3.2.1, p. 101. IEEE (2012). "Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Sponsored by the LAN/MAN
Stephen Kent (network security) (587 words) [view diff] no match in snippet view article
including the design and development of network layer encryption and access-control systems and standards; secure transport layer protocols; secure e-mail
CalDAV (461 words) [view diff] exact match in snippet view article find links to article
semantics to detect conflicting changes, or to provide locking. For access control the concept of ACLs are used, so each operation (view, edit, delete
Malaysian Expressway System (4,684 words) [view diff] exact match in snippet view article find links to article
four lanes (two in each direction) and should have full access control or partial access control. Most expressways in Malaysia are controlled-access expressways
SPNEGO (505 words) [view diff] no match in snippet view article find links to article
Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO), often pronounced "spenay-go", is a GSSAPI "pseudo mechanism" used by client-server software
Generic Framing Procedure (406 words) [view diff] exact match in snippet view article find links to article
be protocol data unit (PDU) oriented (like IP/PPP or Ethernet media access control) or can be block-code oriented (like Fibre Channel). There are two modes
Windows 9x (6,249 words) [view diff] exact match in snippet view article find links to article
Windows 9x offers share-level access control security for file and printer sharing as well as user-level access control if a Windows NT-based operating
ProcessWire (1,115 words) [view diff] exact match in snippet view article find links to article
installations Use of string-based selectors for API calls Role-based access control system Core development emphasis on security Markup agnostic output
Active Directory Federation Services (584 words) [view diff] no match in snippet view article find links to article
applications located across organizational boundaries. It uses a claims-based access-control authorization model to maintain application security and to implement
Media Foundation (2,832 words) [view diff] exact match in snippet view article find links to article
HDTV), content protection and a more unified approach for digital data access control for digital rights management (DRM) and its interoperability. It integrates
Outline of telecommunication (492 words) [view diff] case mismatch in snippet view article find links to article
Time-division multiplexing Statistical multiplexing and Packet switching Media Access Control Contention Token-based Centralized token control Distributed token control
Limited-access road (6,443 words) [view diff] exact match in snippet view article find links to article
partial" access control and "generally" has grade separations at intersections; a freeway is then defined as an expressway with full access control. Ohio's
Ethernet flow control (1,231 words) [view diff] exact match in snippet view article find links to article
transmission of the sender for a specified period of time. A media access control (MAC) frame (EtherType 0x8808) is used to carry the pause command, with
WS-Trust (349 words) [view diff] case mismatch in snippet view article find links to article
products that act as a Security Token Service, or STS. Microsoft's Access Control Services is one such service, available online today. PingIdentity Corporation
Eucalyptus (software) (2,245 words) [view diff] exact match in snippet view article
VM isolation. Access Control – A user of Eucalyptus is assigned an identity, and identities can be grouped together for access control. Eucalyptus has
Jenkins (software) (1,398 words) [view diff] exact match in snippet view article
Jenkins' security depends on two factors: access control and protection from external threats. Access control can be customized via two ways: user authentication
Boa (web server) (188 words) [view diff] exact match in snippet view article
images. As of its last release, Boa has the following limitations: No access control features (HTTP Basic access authentication, etc.) No chroot option (planned)
Bar gate (616 words) [view diff] case mismatch in snippet view article find links to article
Systems Interlocking System with a parking management system Bluetooth Access Control – Allows users to open the gate via a mobile app or paired Bluetooth
Common Management Information Protocol (609 words) [view diff] exact match in snippet view article find links to article
directory. CMIP also provides good security (support authorization, access control, and security logs) and flexible reporting of unusual network conditions
Key escrow (565 words) [view diff] exact match in snippet view article find links to article
court), and granting of access by technical personnel charged with access control. All such linkages / controls have serious problems from a system design
Oberthur Technologies (459 words) [view diff] case mismatch in snippet view article find links to article
Financial Services, Machine-to-Machine, Digital Identity and Transport & Access Control. As of 2008, Oberthur's revenue was €882 million. Oberthur Technologies
Needham–Schroeder protocol (2,192 words) [view diff] no match in snippet view article find links to article
The Needham–Schroeder protocol is one of the two key transport protocols intended for use over an insecure network, both proposed by Roger Needham and
Voluntary Voting System Guidelines (1,407 words) [view diff] exact match in snippet view article find links to article
logging Bases access control on voting stage (pre-voting, activated, suspended, post-voting) Does not require role-based access control (RBAC) Requires
Oberthur Technologies (459 words) [view diff] case mismatch in snippet view article find links to article
Financial Services, Machine-to-Machine, Digital Identity and Transport & Access Control. As of 2008, Oberthur's revenue was €882 million. Oberthur Technologies
IEEE 802.16 (822 words) [view diff] exact match in snippet view article find links to article
aspects of the air interface – the physical layer (PHY) and the media access control (MAC) layer. This section provides an overview of the technology employed
Assa Abloy (1,690 words) [view diff] exact match in snippet view article find links to article
an undisclosed sum. In August 2022, ALCEA, a company specializing in access control solutions and catering to various vertical markets, was acquired by
CNGrid (677 words) [view diff] exact match in snippet view article find links to article
RController provides many functions for resources like create, destroy, access control, access, read and write properties, etc. VO management Virtual organization
Jalan Lama Alor Gajah (98 words) [view diff] exact match in snippet view article find links to article
Federal Route 191 was built under the JKR R5 road standard with partial access control, with a speed limit of 90 km/h. Statistik Jalan (Edisi 2013). Kuala
Securitas AB (2,305 words) [view diff] exact match in snippet view article find links to article
first technical breakthrough in 1961 with the Securi-Coll automatic access control system. The company then introduced a payment system for petrol stations
Malaysia Federal Route 19 (193 words) [view diff] exact match in snippet view article find links to article
Melekek section and Taboh Naning–Ulu Kendong section) with partial access control, with a speed limit of 90 km/h. There is one overlap: Bulatan Taboh
Amazon S3 (1,908 words) [view diff] exact match in snippet view article find links to article
can be up to five terabytes in size. Requests are authorized using an access control list associated with each object bucket and support versioning which
Military road (189 words) [view diff] no match in snippet view article find links to article
an armed force of a country, which is usually responsible for its access, control, and maintenance. It is used mostly by soldiers, government officials
Time Slotted Channel Hopping (1,144 words) [view diff] exact match in snippet view article find links to article
low-power and lossy networks (LLNs) and aims at providing a reliable Media access control layer. TSCH can be seen as a combination of Time-division multiple access
Chamberlain Group (450 words) [view diff] exact match in snippet view article find links to article
Products Systems Group, the largest wholesale distributor of perimeter access control equipment in the United States. In September 2021, The Duchossois Group
SQLite (3,319 words) [view diff] exact match in snippet view article find links to article
management, startup scripts, and password- or GRANT-based access control are unnecessary. Access control is handled through the file-system permissions of the
Eyetech (594 words) [view diff] exact match in snippet view article find links to article
code decoders and industrial (networked) shop floor data capture and access control systems. Eyetech took an interest in Amiga, as well as being a registered
Stratus VOS (2,517 words) [view diff] exact match in snippet view article find links to article
inherited access control lists from Multics and also implements directory access control lists. If a file does not have an access control list, the containing
Federal Protective Service (United States) (3,520 words) [view diff] exact match in snippet view article
a further 13,000 armed protective security officers (PSO) providing access control and security response within federal buildings. These PSOs are not federal
KNX (2,011 words) [view diff] exact match in snippet view article find links to article
sits above the specific data link layers for each medium, provides access control and the logical link control; A network layer (for nodes with routing
Ace (disambiguation) (1,499 words) [view diff] exact match in snippet view article
renin–angiotensin system (RAS), which controls blood pressure Access Control Entry, part of an access control list ACE (compressed file format) Ace (editor), a code
DRM (293 words) [view diff] exact match in snippet view article find links to article
rights movement Disaster risk management Digital rights management, access control technologies that limit the usage of digital content and devices "Digital
Dublin Harbour Police (237 words) [view diff] exact match in snippet view article find links to article
a voluntary arrangement of over 200,000 euro paid to each officer) Access control will be undertaken by contracted private security companies, however
Time clock (2,009 words) [view diff] exact match in snippet view article find links to article
the system. Biometric readers are often used in conjunction with an access control system, granting the user access to a building, and at the same time
Dublin Harbour Police (237 words) [view diff] exact match in snippet view article find links to article
a voluntary arrangement of over 200,000 euro paid to each officer) Access control will be undertaken by contracted private security companies, however
DRM (293 words) [view diff] exact match in snippet view article find links to article
rights movement Disaster risk management Digital rights management, access control technologies that limit the usage of digital content and devices "Digital
Chattr (713 words) [view diff] exact match in snippet view article find links to article
in a Unix system chmod – change file access control attributes in a Unix system cacls – change file access control lists in Microsoft Windows NT chmod(1) – illumos
Abandonware (7,904 words) [view diff] case mismatch in snippet view article find links to article
to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies In November 2006 the Library of Congress approved an exemption
GPRS (3,499 words) [view diff] case mismatch in snippet view article find links to article
- Base Station System (BSS) interface; Radio Link Control / Medium Access Control (RLC/MAC) protocol; section 10.0a.1 - GPRS RLC/MAC block for data transfer"
Data set (IBM mainframe) (1,572 words) [view diff] case mismatch in snippet view article
running program they are stored in the Data Control Block (DCB) or Access Control Block (ACB), which are data structures used to access data sets using
WebDAV (1,776 words) [view diff] exact match in snippet view article find links to article
RFC 3648, issued December 2003 the access control protocol: "Web Distributed Authoring and Versioning (WebDAV) Access Control Protocol" RFC 3744, issued May
Courthouse (1,698 words) [view diff] exact match in snippet view article find links to article
the court have entered the building through security screenings and access control checkpoints, the circulation systems of passageways through the building
Softwell Maker (1,194 words) [view diff] case mismatch in snippet view article find links to article
databases simultaneously; Production and consumption of Web services; Access Control, and audit logs; Support for HTTPS and client authentication; Exporting
Niels Provos (688 words) [view diff] exact match in snippet view article find links to article
including the libevent event driven programming system, the Systrace access control system, the honeyd honeypot system, the StegDetect steganography detector
Foswiki (1,449 words) [view diff] exact match in snippet view article find links to article
include an auditable version control system, user authentication, an access control system, cross-site request forgery protection, and improved spam-prevention
Apache Jackrabbit (261 words) [view diff] exact match in snippet view article find links to article
queries Unstructured content Import and export Referential integrity Access control Versioning JTA support Observation Locking Clustering Multiple persistence
Online identity management (1,540 words) [view diff] exact match in snippet view article find links to article
important building block of cybersecurity. It forms the basis for most access control types and establishing accountability online. One aspect of the online
HTTP 403 (654 words) [view diff] exact match in snippet view article find links to article
Forbidden 404 Not Found 451 Unavailable for Legal Reasons Security access control methods Basic access authentication Digest access authentication Security
StarLAN (809 words) [view diff] case mismatch in snippet view article find links to article
members of the IEEE 802.3 standards committee as the Twisted Pair Medium Access Control sublayer and Physical Signalling sublayer specification in section 12
Internet Archive (13,390 words) [view diff] case mismatch in snippet view article find links to article
to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies". Federal Register. 71 (227): 68472–68480. Archived from
Architecture of Windows NT (4,217 words) [view diff] exact match in snippet view article find links to article
resource can be accessed, via the use of access control lists (ACLs), which are themselves made up of access control entries (ACEs). ACEs contain a Security
Decentralized identifier (713 words) [view diff] no match in snippet view article find links to article
A decentralized identifier (DID) is a type of globally unique identifier that enables an entity to be identified in a manner that is verifiable, persistent
Microsoft Fingerprint Reader (337 words) [view diff] no match in snippet view article find links to article
Microsoft Fingerprint Reader was a device sold by Microsoft, primarily for homes and small businesses. The underlying software providing the biometrics
48-bit computing (398 words) [view diff] exact match in snippet view article find links to article
expand this without breaking properly written applications. The media access control address (MAC address) of a network interface controller uses a 48-bit
MTR Properties (140 words) [view diff] case mismatch in snippet view article find links to article
Properties is also a property agent, and provide services on Octopus Access Control System and environmental hygiene service. It operates the following
General protection fault (1,262 words) [view diff] no match in snippet view article find links to article
its use However, many modern operating systems implement their memory access-control schemes via paging instead of segmentation, so it is often the case
Anti-circumvention (2,541 words) [view diff] exact match in snippet view article find links to article
matter is controlled by the rights holders through application of an access control or protection process, such as encryption, scrambling or other transformation
RadSec (260 words) [view diff] no match in snippet view article find links to article
RadSec is a protocol for transporting RADIUS datagrams over TCP and TLS. The RADIUS protocol is a widely deployed authentication and authorization protocol
XMLHttpRequest (1,207 words) [view diff] exact match in snippet view article find links to article
Forbidden 404 Not Found 451 Unavailable for Legal Reasons Security access control methods Basic access authentication Digest access authentication Security
User-Managed Access (1,514 words) [view diff] case mismatch in snippet view article find links to article
[citation needed] UMA also does not use or depend on the eXtensible Access Control Markup Language (XACML) as a means of encoding user policy or requesting
YubiKey (2,957 words) [view diff] no match in snippet view article find links to article
The YubiKey is a hardware authentication device manufactured by Yubico to protect access to computers, networks, and online services that supports one-time
YubiKey (2,957 words) [view diff] no match in snippet view article find links to article
The YubiKey is a hardware authentication device manufactured by Yubico to protect access to computers, networks, and online services that supports one-time
Unique identifier (710 words) [view diff] exact match in snippet view article find links to article
are guaranteed to be globally unique. Examples include (1) the media access control address MAC address uniquely assigned to each individual hardware network
National Highway 751 (India) (220 words) [view diff] case mismatch in snippet view article
has 250 Meter wide alignment for the central spine road, NH 751 is access Control Express way and is elevated at most of the junctions it connects (Nari
Strike (685 words) [view diff] exact match in snippet view article find links to article
unit of volume, typically equivalent to two bushels Electric strike, access control device used for doors Lightning strike, electrical discharges caused
Regimental police (1,398 words) [view diff] exact match in snippet view article find links to article
within the unit according to their rank, or deployed solely to perform access control into the base at key entry points. In the Sri Lanka Army, regiments
Sam Jones Expressway (430 words) [view diff] exact match in snippet view article find links to article
Raymond Street Expressway) is a 4-lane divided highway with partial access control (urban expressway) in the city of Indianapolis. Renamed in 2007 to honor
NTLMSSP (99 words) [view diff] no match in snippet view article find links to article
NTLMSSP (NT LAN Manager (NTLM) Security Support Provider) is a binary messaging protocol used by the Microsoft Security Support Provider Interface (SSPI)
Webhook (526 words) [view diff] case mismatch in snippet view article find links to article
DocuSign, Inc. Retrieved January 15, 2020. Mutual TLS plus Client Access Control enables your listener app to ensure that the Connect notification message
Network allocation vector (324 words) [view diff] no match in snippet view article find links to article
The network allocation vector (NAV) is a virtual carrier-sensing mechanism used with wireless network protocols such as IEEE 802.11 (Wi-Fi) and IEEE 802
Receptionist (1,103 words) [view diff] exact match in snippet view article find links to article
lobby area tidy. A receptionist may also assume some security guard access control functions for an organization by verifying employee identification,
Trivial File Transfer Protocol (1,750 words) [view diff] exact match in snippet view article find links to article
includes no login or access control mechanisms. Care must be taken when using TFTP for file transfers where authentication, access control, confidentiality
Enterprise portal (1,199 words) [view diff] exact match in snippet view article find links to article
often based on your role or job function within the portal context. Access control — the ability for portal to limit specific types of content and services
Automated fingerprint identification (1,102 words) [view diff] exact match in snippet view article find links to article
closely related technique used in applications such as attendance and access control systems. On a technical level, verification systems verify a claimed
Data security (1,394 words) [view diff] exact match in snippet view article find links to article
controllers making illegal access to data impossible. Hardware-based access control is more secure than the protection provided by the operating systems
DCF Interframe Space (141 words) [view diff] no match in snippet view article find links to article
The IEEE 802.11 family of standards describe the DCF protocol, which controls access to the physical medium. A station must sense the status of the wireless
Wi-Fi (12,881 words) [view diff] exact match in snippet view article find links to article
Logical Link Control (LLC) specified by IEEE 802.2 employs Wi-Fi's media access control (MAC) protocols to manage retries without relying on higher levels of
KeeLoq (1,561 words) [view diff] exact match in snippet view article find links to article
KeeLoq RFID technology. Their attack works on all known car and building access control systems that rely on the KeeLoq cipher. The attack by the Bochum team
Network topology (5,238 words) [view diff] exact match in snippet view article find links to article
aircraft. Logical topologies are often closely associated with media access control methods and protocols. Some networks are able to dynamically change
Comparison of download managers (484 words) [view diff] no match in snippet view article find links to article
browser ZIP preview Add-on support Scheduler Checksum verification Remote Access/Control Modified Timestamp preserved BitComet Yes Yes Yes ? Yes ? Yes ? Yes
Iris recognition (6,115 words) [view diff] no match in snippet view article find links to article
such devices unsuitable for unsupervised applications, such as door access-control systems. However, this is not the case with all iris recognition algorithms
SPA Highway (159 words) [view diff] exact match in snippet view article find links to article
the JKR R5 road standard as a dual-carriageway highway with partial access control, with a speed limit of 90 km/h. There are no overlaps, alternate routes
IEEE 802.11n-2009 (4,501 words) [view diff] exact match in snippet view article find links to article
headers (Preamble + PLCP) and acknowledgment frames. The main media access control (MAC) feature that provides a performance improvement is aggregation
WIPO Copyright and Performances and Phonograms Treaties Implementation Act (2,645 words) [view diff] no match in snippet view article find links to article
exceptions. The act creates a distinction between access-control measures and copy-control measures. An access-control measure limits access to the contents of
Xsan (740 words) [view diff] exact match in snippet view article find links to article
Macintosh computers as a Universal binary and supports file system access control lists. On December 5, 2006, Apple released Xsan 1.4.1. On October 18
Bosch (company) (5,324 words) [view diff] exact match in snippet view article
intrusion detection, fire detection, and voice-alarm systems, as well as access control and professional audio and conference systems. The Thermotechnik GmbH
Identity driven networking (622 words) [view diff] exact match in snippet view article find links to article
to rely upon authentication technologies for the provisioning of an access control policy. For instance; Packet filtering -firewall, content-control software
Luzhniki Stadium (3,452 words) [view diff] exact match in snippet view article find links to article
During the World Cup, Luzhniki had six access control stations with 39 inspection lines, and seven access control points with 427 entrances for fans arriving
Graham–Denning model (416 words) [view diff] exact match in snippet view article find links to article
addresses how to assign specific access rights. It is mainly used in access control mechanisms for distributed systems. There are three main parts to the
Pre-boot authentication (628 words) [view diff] no match in snippet view article find links to article
Pre-boot authentication (PBA) or power-on authentication (POA) serves as an extension of the BIOS, UEFI or boot firmware and guarantees a secure, tamper-proof
Comparison of privilege authorization features (2,340 words) [view diff] no match in snippet view article find links to article
A number of computer operating systems employ security features to help prevent malicious software from gaining sufficient privileges to compromise the
LogicLocker (587 words) [view diff] case mismatch in snippet view article find links to article
changes, disabling of unused ports and protocols and implementation of Access Control Lists (ACL), maintaining proper backups and firmware updates should
Attribute-based encryption (1,325 words) [view diff] exact match in snippet view article find links to article
generalisation of public-key encryption which enables fine grained access control of encrypted data using authorisation policies. The secret key of a
Pre-boot authentication (628 words) [view diff] no match in snippet view article find links to article
Pre-boot authentication (PBA) or power-on authentication (POA) serves as an extension of the BIOS, UEFI or boot firmware and guarantees a secure, tamper-proof
Multi-Choice TV (551 words) [view diff] exact match in snippet view article find links to article
decode their signal which is based on Nagravision which is a conditional access control system developed by the Kudelski Group. In order to prevent such activity
Comparison of privilege authorization features (2,340 words) [view diff] no match in snippet view article find links to article
A number of computer operating systems employ security features to help prevent malicious software from gaining sufficient privileges to compromise the
Poken (706 words) [view diff] exact match in snippet view article find links to article
NFC interactive USB devices, lead generation devices, gamification, access control, and metrics reporting. The company, Poken S.A., was founded in December
Mobile content management system (501 words) [view diff] exact match in snippet view article find links to article
can be applied. Access control includes authorization, authentication, access approval to each content. In many cases the access control also includes download
Token (376 words) [view diff] exact match in snippet view article find links to article
its bearer Access token, a system object representing the subject of access control operations Tokenization (data security), the process of substituting
Organizationally unique identifier (3,322 words) [view diff] no match in snippet view article find links to article
An organizationally unique identifier (OUI) is a 24-bit number that uniquely identifies a vendor, manufacturer, or other organization. OUIs are purchased
Cacti (software) (1,307 words) [view diff] case mismatch in snippet view article
supports both User and User Groups security models and supports Role Based Access Control (RBAC) for access to not only monitoring data, but various areas of
Wide Mouth Frog protocol (427 words) [view diff] no match in snippet view article find links to article
The Wide-Mouth Frog protocol is a computer network authentication protocol designed for use on insecure networks (the Internet for example). It allows
Unikernel (1,115 words) [view diff] exact match in snippet view article find links to article
hardware or talk network protocols; a set of policies that enforce access control and isolation in the application layer. The library OS architecture
Object-capability model (1,026 words) [view diff] exact match in snippet view article find links to article
scientist E. Dean Tribble stated that in smart contracts, identity-based access control did not support well dynamically changing permissions, compared to the
Comparison of shopping cart software (925 words) [view diff] exact match in snippet view article find links to article
Access control list Form CAPTCHA Staff action logging PA/DSS certified Apache OFBiz Yes Yes Yes No BigCommerce Yes Yes Yes No Drupal Commerce Yes add-on
Attribute-based encryption (1,325 words) [view diff] exact match in snippet view article find links to article
generalisation of public-key encryption which enables fine grained access control of encrypted data using authorisation policies. The secret key of a
EBeam (232 words) [view diff] exact match in snippet view article find links to article
where an interactive stylus or marker could be used to add notes, access control menus, manipulate images, and create diagrams and drawings. The presentations
FTP bounce attack (156 words) [view diff] no match in snippet view article find links to article
to port scan hosts discreetly, and to potentially bypass a network's access-control list to access specific ports that the attacker cannot access through
Army Knowledge Online (1,178 words) [view diff] exact match in snippet view article find links to article
process management and collaboration across AKO. Users can build custom access control lists for each piece of content they own to determine the audience allowed
Protected mode (4,371 words) [view diff] exact match in snippet view article find links to article
language Intel Ring (computer security) x86 assembly language "Memory access control method and system for realizing the same". US Patent 5483646. May 23
Broadband over power lines (2,735 words) [view diff] exact match in snippet view article find links to article
Medium Access Control and Physical Layer Specifications" is a working group for delivering broadband over power lines. The aim is to define medium access control
GOV.UK Verify (1,940 words) [view diff] no match in snippet view article find links to article
GOV.UK Verify was an identity assurance system developed by the British Government Digital Service (GDS) which was in operation between May 2016 and April
XOOPS (571 words) [view diff] exact match in snippet view article find links to article
required for running a web-based content management system. Advanced access control layer Administrators have the ability to grant specific groups of users
Computational trust (3,088 words) [view diff] no match in snippet view article find links to article
In information security, computational trust is the generation of trusted authorities or user trust through cryptography. In centralised systems, security
Daisy chain (electrical engineering) (834 words) [view diff] case mismatch in snippet view article
Little (1997). Security, ID Systems and Locks: The Book on Electronic Access Control. p. 170: daisy chain loop illustration. Look up daisy chain in Wiktionary
ISO/IEC 27001 (1,497 words) [view diff] exact match in snippet view article find links to article
These controls address various aspects of information security, such as access control, cryptography, physical security, and incident management. ISO/IEC 27001
OpenDJ (1,110 words) [view diff] exact match in snippet view article find links to article
(DSMLv2). Written in Java, OpenDJ offers multi-master replication, access control, and many extensions. OpenDJ began as a fork of OpenDS, an LDAP / DSML
Auth-Code (538 words) [view diff] no match in snippet view article find links to article
An Auth-Code, also known as an EPP code, authorization code, transfer code, or Auth-Info Code, is a generated passcode required to transfer an Internet
Installable File System (1,185 words) [view diff] case mismatch in snippet view article find links to article
improved performance and added some features, like variable size cache and Access Control Lists, and was available only in certain OS/2 server editions. The FAT
Port of Sines (764 words) [view diff] exact match in snippet view article find links to article
such as: control of maritime traffic; pilotage, towage and mooring; access control and surveillance; drinking water and bunkers; prevent accidents/pollution;
UL (safety organization) (2,923 words) [view diff] case mismatch in snippet view article
and Power Supply Cords UL 2556, Wire and Cable Test Methods UL 294, Access Control System Units (ANSI Approved: May 24, 2023) UL 365, Standard for Police
Cp (Unix) (745 words) [view diff] exact match in snippet view article
The copy also receives other metadata from the original including access control protection. cp -p smith smith.jr This reclusively copies the directory
.NET Remoting (760 words) [view diff] exact match in snippet view article find links to article
calls can be implemented using threading libraries. Authentication and access control can be implemented for clients by either using custom Channels or by
ACL (335 words) [view diff] no match in snippet view article find links to article
Australian Christian Lobby, a right wing Christian campaigning group Access-control list in computer security ACL2, theorem prover Agent Communications
United States Uniformed Services Privilege and Identification Card (976 words) [view diff] exact match in snippet view article find links to article
works with specialized card readers for use with automatic building access control systems, communications encryption, and computer access. U.S. military