language:
Find link is a tool written by Edward Betts.Longer titles found: Access control expression (view), Access control matrix (view), Medium access control (view), Computer access control (view), Role-based access control (view), Mandatory access control (view), Network access control (view), Context-based access control (view), Discretionary access control (view), Resource Access Control Facility (view), Attribute-based access control (view), Lattice-based access control (view), Basic access control (view), Mantrap (access control) (view), Extended Access Control (view), Internet Group Management Protocol with Access Control (view), Organisation-based access control (view), Graph-based access control (view), VLAN access control list (view), Access Control Service (view), Distributed Access Control System (view), Relationship-based access control (view)
searching for Access control 258 found (2168 total)
alternate case: access control
Time-based one-time password
(649 words)
[view diff]
no match in snippet
view article
find links to article
Time-based one-time password (TOTP) is a computer algorithm that generates a one-time password (OTP) using the current time as a source of uniqueness.Wiki (5,631 words) [view diff] exact match in snippet view article find links to article
adding, or removing material. Others may permit access without enforcing access control. Further rules may be imposed to organize content. In addition to hostingCross-origin resource sharing (1,503 words) [view diff] no match in snippet view article find links to article
Origin Host Access-Control-Request-Method Access-Control-Request-Headers Access-Control-Allow-Origin Access-Control-Allow-Credentials Access-Control-Expose-HeadersAuthority control (3,222 words) [view diff] exact match in snippet view article find links to article
ideology. An alternative to using authorized headings is the idea of access control, where various forms of a name are related without the endorsement ofChmod (1,529 words) [view diff] exact match in snippet view article find links to article
same name as the command, chmod(), provides access to the underlying access control data. The command exposes the capabilities of the system call to a shellIEEE 802.3 (362 words) [view diff] exact match in snippet view article find links to article
of standards defining the physical layer and data link layer's media access control (MAC) of wired Ethernet. The standards are produced by the working groupAuthentication protocol (1,192 words) [view diff] no match in snippet view article find links to article
An authentication protocol is a type of computer communications protocol or cryptographic protocol specifically designed for transfer of authenticationIEEE 802.11i-2004 (1,586 words) [view diff] exact match in snippet view article find links to article
group key handshake. These utilize the authentication services and port access control described in IEEE 802.1X to establish and change the appropriate cryptographicApache Shiro (575 words) [view diff] no match in snippet view article find links to article
Apache Shiro (pronounced "sheeroh", a Japanese word for castle (Japanese: 城)) is an open source software security framework that performs authenticationIndieAuth (226 words) [view diff] no match in snippet view article find links to article
IndieAuth is an open standard decentralized authentication protocol that uses OAuth 2.0 and enables services to verify the identity of a user representedFederated identity (1,426 words) [view diff] no match in snippet view article find links to article
A federated identity in information technology is the means of linking a person's electronic identity and attributes, stored across multiple distinct identityRegin (malware) (1,128 words) [view diff] no match in snippet view article
Regin (also known as Prax or QWERTY) is a sophisticated malware and hacking toolkit used by United States' National Security Agency (NSA) and its BritishLinux PAM (325 words) [view diff] no match in snippet view article find links to article
Linux Pluggable Authentication Modules (PAM) is a suite of libraries that allow a Linux system administrator to configure methods to authenticate usersIEC 62351 (474 words) [view diff] exact match in snippet view article find links to article
Role-based access control. Covers the access control of users and automated agents to data objects in power systems by means of role-based access control (RBAC)ISO/IEC 27002 (1,923 words) [view diff] case mismatch in snippet view article find links to article
Organization of Information Security Human Resource Security Asset Management Access Control Cryptography Physical and environmental security Operation Security-U-Prove (509 words) [view diff] no match in snippet view article find links to article
U-Prove is a free and open-source technology and accompanying software development kit for user-centric identity management. The underlying cryptographicStructured Financial Messaging System (375 words) [view diff] exact match in snippet view article find links to article
architecture facilitating centralised or distributed deployment. The access control is through Smart Card based user access and messages are secured byReal estate in Puerto Rico (1,378 words) [view diff] case mismatch in snippet view article find links to article
can achieve healthy living and community interaction. The concept of Access Control implies that the public nature of residential streets is preserved,Account verification (1,715 words) [view diff] no match in snippet view article find links to article
Account verification is the process of verifying that a new or existing account is owned and operated by a specified real individual or organization. AWindows Resource Protection (671 words) [view diff] exact match in snippet view article find links to article
Resource Protection works by setting discretionary access control lists (DACLs) and access control lists (ACLs) defined for protected resources. PermissionShamoon (1,964 words) [view diff] no match in snippet view article find links to article
Shamoon (Persian: شمعون), also known as W32.DistTrack, is a modular computer virus that was discovered in 2012, targeting then-recent 32-bit NT kernelIntegrated Windows Authentication (892 words) [view diff] no match in snippet view article find links to article
Integrated Windows Authentication (IWA) is a term associated with Microsoft products that refers to the SPNEGO, Kerberos, and NTLMSSP authentication protocolsList of HTTP header fields (2,491 words) [view diff] exact match in snippet view article find links to article
Forbidden 404 Not Found 451 Unavailable for Legal Reasons Security access control methods Basic access authentication Digest access authentication SecurityBACnet (1,149 words) [view diff] exact match in snippet view article find links to article
ventilating, and air-conditioning control (HVAC), lighting control, access control, and fire detection systems and their associated equipment. The BACnetInner Ring Road, Bengaluru (314 words) [view diff] exact match in snippet view article find links to article
Rajanukunte and Madure these 14 towns connected. This road 8 lane access control highway and 2 lane service road facility provided. arterial road inTables (Google) (934 words) [view diff] no match in snippet view article
Tables is a collaborative database program developed out of Google's Area 120 incubator. Tables is available as a web application. The app allows usersSystem File Checker (1,224 words) [view diff] exact match in snippet view article find links to article
Resource Protection (WRP) works by setting discretionary access-control lists (DACLs) and access control lists (ACLs) defined for protected resources. If anyDatabase audit (154 words) [view diff] no match in snippet view article find links to article
Database auditing involves observing a database to be aware of the actions of database users. Database administrators and consultants often set up auditingWiMAX (6,012 words) [view diff] exact match in snippet view article find links to article
802.16 set of standards, which provide physical layer (PHY) and media access control (MAC) options. The WiMAX Forum was formed in June 2001 to promote conformityMalaysian Federal Roads System (2,268 words) [view diff] exact match in snippet view article find links to article
FELDA settlements with no access control and low speed limits) to R5 (federal roads or highways with limited access control and speed limits up to 90 km/h)Labohan Dagang–Nilai Route (176 words) [view diff] exact match in snippet view article find links to article
the JKR R5 road standard as a dual-carriageway highway with partial access control, with a speed limit of 90 km/h. There are no overlaps, alternate routesIEEE 1901 (2,547 words) [view diff] case mismatch in snippet view article find links to article
state-of the art authentication and authorization mechanisms to the Medium Access Control (MAC) layer using IEEE Std 802.1X, providing secure, interoperable communicationIEEE P802.1p (377 words) [view diff] exact match in snippet view article find links to article
a mechanism for implementing quality of service (QoS) at the media access control (MAC) level. Although this technique is commonly referred to as IEEEIEC 60870-6 (1,896 words) [view diff] no match in snippet view article find links to article
IEC 60870 part 6 in electrical engineering and power system automation, is one of the IEC 60870 set of standards which define systems used for telecontrolSIM card (6,924 words) [view diff] no match in snippet view article find links to article
A SIM card or SIM (subscriber identity module) is an integrated circuit (IC) intended to securely store an international mobile subscriber identity (IMSI)HackingTeam (3,156 words) [view diff] no match in snippet view article find links to article
Hacking Team was a Milan-based information technology company that sold offensive intrusion and surveillance capabilities to governments, law enforcementElectronic business (3,426 words) [view diff] no match in snippet view article find links to article
Electronic business (also known as online business or e-business) is any kind of business or commercial activity that includes sharing information acrossSecurity token (2,611 words) [view diff] no match in snippet view article find links to article
A security token is a peripheral device used to gain access to an electronically restricted resource. The token is used in addition to, or in place ofWeb portal (2,351 words) [view diff] exact match in snippet view article find links to article
enterprises and organizations to provide a consistent "look and feel" with access control and procedures for multiple applications and databases, which otherwiseFinFisher (3,047 words) [view diff] no match in snippet view article find links to article
FinFisher, also known as FinSpy, is surveillance software marketed by Lench IT Solutions plc, which markets the spyware through law enforcement channelsFile archiver (489 words) [view diff] exact match in snippet view article find links to article
stores additional metadata, such as the timestamps, file attributes and access control information. An archiver might compress input file content to reduceArmored car (valuables) (1,347 words) [view diff] no match in snippet view article
An armored vehicle (also known as an armored cash transport car, security van, or armored truck) is an armored van or truck used to transport valuablesBusiness rules engine (1,515 words) [view diff] exact match in snippet view article find links to article
standardized access control to applications. OASIS defines a rules engine architecture and standard dedicated to access control called XACML (eXtensible Access ControlArmored car (valuables) (1,347 words) [view diff] no match in snippet view article
An armored vehicle (also known as an armored cash transport car, security van, or armored truck) is an armored van or truck used to transport valuablesOpenPAM (236 words) [view diff] no match in snippet view article find links to article
Free and open-source software portal OpenPAM is a BSD-licensed implementation of PAM used by FreeBSD, NetBSD, DragonFly BSD and macOS (starting with SnowSwift (programming language) (7,948 words) [view diff] exact match in snippet view article
callAsFunction(4, scale: 2) // Both function calls print 208. Swift supports five access control levels for symbols: open, public, internal, fileprivate, and privateChallenge–response authentication (1,540 words) [view diff] no match in snippet view article find links to article
In computer security, challenge-response authentication is a family of protocols in which one party presents a question ("challenge") and another partyPmWiki (1,942 words) [view diff] exact match in snippet view article find links to article
features that support collaborative editing with built-in tools for access control, delegation, monitoring, review, and edit reversion. PmWiki's designJSON Web Token (1,556 words) [view diff] no match in snippet view article find links to article
JSON Web Token (JWT, suggested pronunciation /dʒɒt/, same as the word "jot") is a proposed Internet standard for creating data with optional signaturePersonal identification number (2,753 words) [view diff] exact match in snippet view article find links to article
uses. In common usage, PINs are used in ATM or PO transactions, secure access control (e.g. computer access, door access, car access), internet transactionsCrew rest compartment (452 words) [view diff] exact match in snippet view article find links to article
example the European Aviation Safety Agency (EASA) regulations for access control, communications, and signage are similar to those of the FAA's. By followingESIM (1,715 words) [view diff] no match in snippet view article find links to article
An eSIM (embedded SIM) is a form of SIM card that is embedded directly into a device as software installed onto a eUICC chip. First released in March 2016Security management (955 words) [view diff] no match in snippet view article find links to article
Security management is the identification of an organization's assets i.e. including people, buildings, machines, systems and information assets, followedSQL (4,009 words) [view diff] exact match in snippet view article find links to article
delete), data definition (schema creation and modification), and data access control. Although SQL is essentially a declarative language (4GL), it also includesJSON Web Signature (432 words) [view diff] no match in snippet view article find links to article
A JSON Web Signature (abbreviated JWS) is an IETF-proposed standard (RFC 7515) for signing arbitrary data. This is used as the basis for a variety of web-basedGit (7,265 words) [view diff] exact match in snippet view article find links to article
Git does not provide access-control mechanisms, but was designed for operation with other tools that specialize in access control. On 17 December 2014Bolloré (1,975 words) [view diff] exact match in snippet view article find links to article
forwarding, oil storage and pipelines in France, solid state batteries, access control systems for buildings, palm oil and rubber in Asia and Africa, oliveKeinawa Expressway (420 words) [view diff] exact match in snippet view article find links to article
north–south (physically northeast–southwest) National Highway with access control (一般国道自動車専用道路 Ippan-kokudō jidōsha-sen-yō-dōro) in the Kinki region ofSolid (web decentralization project) (1,093 words) [view diff] exact match in snippet view article
is to allow users to have full control of their own data, including access control and storage location. To that end, Tim Berners-Lee formed a companySmart ring (883 words) [view diff] exact match in snippet view article find links to article
traditional jewelry ring, can offer functionalities like mobile payments, access control, gesture control, and activity tracking. Their most common feature isIEEE 802.2 (1,422 words) [view diff] exact match in snippet view article find links to article
connectionless mode services (optional). The LLC uses the services of the media access control (MAC), which is dependent on the specific transmission medium (EthernetWiki.js (416 words) [view diff] no match in snippet view article find links to article
Wiki.js is a wiki engine running on Node.js and written in JavaScript. It is free software released under the Affero GNU General Public License. It isUser identifier (1,477 words) [view diff] exact match in snippet view article find links to article
ID or UID. The UID, along with the group identifier (GID) and other access control criteria, is used to determine which system resources a user can accessAudio Video Bridging (2,038 words) [view diff] case mismatch in snippet view article find links to article
base IEEE 802.1Q-2011 document, which specifies the operation of Media Access Control (MAC) Bridges and Virtual Bridged Local Area Networks. AVB was initiallyIndustrial Ethernet (712 words) [view diff] exact match in snippet view article find links to article
Modbus TCP. Many industrial Ethernet protocols use a modified media access control (MAC) layer to provide low latency and determinism. Some microprocessorsStreaming television (6,061 words) [view diff] no match in snippet view article find links to article
Streaming television is the digital distribution of television content, such as films and television series, streamed over the Internet. Standing in contrastFlickr (6,774 words) [view diff] no match in snippet view article find links to article
Flickr (/ˈflɪkər/ FLIK-ər) is an image and video hosting service, as well as an online community, founded in Canada and headquartered in the United StatesComparison of wiki software (1,637 words) [view diff] exact match in snippet view article find links to article
Page Access Control: Some wiki engines allow (optional) read/write access restriction to users or user groups on a per-page basis (e.g. through Access controlDigest access authentication (2,879 words) [view diff] exact match in snippet view article find links to article
Forbidden 404 Not Found 451 Unavailable for Legal Reasons Security access control methods Basic access authentication Digest access authentication SecurityIndustrial Ethernet (712 words) [view diff] exact match in snippet view article find links to article
Modbus TCP. Many industrial Ethernet protocols use a modified media access control (MAC) layer to provide low latency and determinism. Some microprocessorsIRC services (1,256 words) [view diff] exact match in snippet view article find links to article
usually implement some sort of login system so that only people on the access control list can obtain these services. The most popular style of services usesDigest access authentication (2,879 words) [view diff] exact match in snippet view article find links to article
Forbidden 404 Not Found 451 Unavailable for Legal Reasons Security access control methods Basic access authentication Digest access authentication SecuritySee Tickets (714 words) [view diff] exact match in snippet view article find links to article
clients include custom UX and UI development, marketing, customer care, access control and all aspects of ticketing and account management. See Tickets' globalTWiki (1,083 words) [view diff] exact match in snippet view article find links to article
trail, also for meta data such as attachments and access control settings Fine-grained access control - restrict read/write/rename on site level, web levelGoogle Cloud Storage (727 words) [view diff] exact match in snippet view article find links to article
requests are authorized using Identity and Access Management policies or access control lists associated with a user or service account. Bucket names and keysMUSIC/SP (1,252 words) [view diff] exact match in snippet view article find links to article
4300-series mainframe hardware, and offered then-novel features such as file access control and data compression. It was designed to allow academics and studentsCrypt (C) (3,039 words) [view diff] no match in snippet view article
crypt is a POSIX C library function. It is typically used to compute the hash of user account passwords. The function outputs a text string which alsoX Window authorization (776 words) [view diff] exact match in snippet view article find links to article
from the one who is logged in is necessary. There are five standard access control mechanisms that control whether a client application can connect toSQL:1999 (722 words) [view diff] no match in snippet view article find links to article
SQL:1999 (also called SQL 3) was the fourth revision of the SQL database query language. It introduced many new features, many of which required clarificationsFUJITSU Cloud IaaS Trusted Public S5 (1,437 words) [view diff] case mismatch in snippet view article find links to article
Azure, and Windows Azure AppFabric technologies such as Service Bus and Access Control Service, with options for interoperating services covering implementationCommon Criteria (3,769 words) [view diff] exact match in snippet view article find links to article
maintains a list of certified products, including operating systems, access control systems, databases, and key management systems. Common Criteria evaluationsRemote Utilities (736 words) [view diff] no match in snippet view article find links to article
Remote Utilities is a remote desktop software that allows a user to remotely control another computer through a proprietary protocol and see the remoteData loss prevention software (1,443 words) [view diff] exact match in snippet view article find links to article
standard security measures, advanced/intelligent security measures, access control and encryption and designated DLP systems, although only the latterOpen (system call) (1,135 words) [view diff] exact match in snippet view article
access, as restricted by permission flags within the file meta data or access control list, is validated against the requested type of operations. This usuallyCrowne Plaza Liverpool John Lennon Airport Hotel (424 words) [view diff] exact match in snippet view article find links to article
although it is no longer connected to the airport or subject to airside access control. It is the home of several aircraft, including BAe Jetstream 41 prototypeWeb Calendar Access Protocol (503 words) [view diff] no match in snippet view article find links to article
<X-NSCP-CALPROPS-ACCESS-CONTROL-ENTRY>@@o^c^WDEIC^g</X-NSCP-CALPROPS-ACCESS-CONTROL-ENTRY> <X-NSCP-CALPROPS-ACCESS-CONTROL-ENTRY>@@o^a^RSF^g</X-NSCP-CALPROPS-ACCESS-CONTROL-ENTRY>IEEE 802.11e-2005 (2,208 words) [view diff] exact match in snippet view article find links to article
enhancements for wireless LAN applications through modifications to the media access control (MAC) layer. The standard is considered of critical importance for delay-sensitiveMutual authentication (3,032 words) [view diff] no match in snippet view article find links to article
Mutual authentication or two-way authentication (not to be confused with two-factor authentication) refers to two parties authenticating each other atSelf-sovereign identity (1,392 words) [view diff] no match in snippet view article find links to article
Self-sovereign identity (SSI) is an approach to digital identity that gives individuals control over the information they use to prove who they are toIEEE 802.11k-2008 (390 words) [view diff] case mismatch in snippet view article find links to article
metropolitan area networks--Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. 1 November 2012. pp. 1–2798Crime prevention through environmental design (4,330 words) [view diff] exact match in snippet view article find links to article
to a detailed study of specific topics such as natural surveillance, access control, and territoriality. The "broken window" principle, that neglected zonesOASIS (organization) (2,376 words) [view diff] case mismatch in snippet view article
of emergency-related organizations GeoXACML — Geospatial eXtensible Access Control Markup Language, a geo-specific extension to XACML Version 2.0, mainlyManaged lane (3,899 words) [view diff] exact match in snippet view article find links to article
of three categories. These include pricing, vehicle eligibility, and access control. Most managed lane implementation incorporate the application of multipleSecure attention key (414 words) [view diff] no match in snippet view article find links to article
A secure attention key (SAK), special attention key, or secure attention sequence (SAS) is a special key, key combination or sequence to be pressed onForwarding information base (1,287 words) [view diff] no match in snippet view article find links to article
filtering. Though the simplest form of ingress filtering is to use access-control lists to drop packets with improper source addresses, the use of accessSMTP Authentication (1,229 words) [view diff] no match in snippet view article find links to article
SMTP Authentication, often abbreviated SMTP AUTH, is an extension of the Simple Mail Transfer Protocol (SMTP) whereby a client may log in using any authenticationDigital Ocean (2,170 words) [view diff] exact match in snippet view article find links to article
contracts with AT&T/Lucent and Aironet to license Digital Ocean's media access control (MAC) chipset technology in return for access to AT&T/Lucent's semiconductorUniversal 2nd Factor (1,477 words) [view diff] no match in snippet view article find links to article
Universal 2nd Factor (U2F) is an open standard that strengthens and simplifies two-factor authentication (2FA) using specialized Universal Serial Bus (USB)Law enforcement in the Marshall Islands (706 words) [view diff] case mismatch in snippet view article find links to article
employees, Alutiiq still remains on Kwajalein, as the “Security and Access Control Contractor”, providing security guard patrols, Customs/TSA servicesWake-on-LAN (4,136 words) [view diff] exact match in snippet view article find links to article
technology on enterprise networks can sometimes conflict with network access control solutions such as 802.1X MAC-based authentication, which may preventMAC spoofing (1,345 words) [view diff] case mismatch in snippet view article find links to article
MAC spoofing is a technique for changing a factory-assigned Media Access Control (MAC) address of a network interface on a networked device. The MAC addressHMAC-based one-time password (1,061 words) [view diff] no match in snippet view article find links to article
HMAC-based one-time password (HOTP) is a one-time password (OTP) algorithm based on HMAC. It is a cornerstone of the Initiative for Open AuthenticationExpressways of India (3,517 words) [view diff] exact match in snippet view article find links to article
highways may or may not be divided by a median and may or may not have access control. Some highways, built by State Governments, which may be fully accessIdentity provider (308 words) [view diff] no match in snippet view article find links to article
An identity provider (abbreviated IdP or IDP) is a system entity that creates, maintains, and manages identity information for principals and also providesMAC flooding (622 words) [view diff] exact match in snippet view article find links to article
In computer networking, a media access control attack or MAC flooding is a technique employed to compromise the security of network switches. The attackSecurity question (686 words) [view diff] no match in snippet view article find links to article
A security question is a form of shared secret used as an authenticator. It is commonly used by banks, cable companies and wireless providers as an extraConfused deputy problem (1,220 words) [view diff] no match in snippet view article find links to article
Capability systems protect against the confused deputy problem, whereas access-control list–based systems do not. In the original example of a confused deputyX-Forwarded-For (744 words) [view diff] exact match in snippet view article find links to article
Forbidden 404 Not Found 451 Unavailable for Legal Reasons Security access control methods Basic access authentication Digest access authentication SecuritySensitive compartmented information (1,537 words) [view diff] exact match in snippet view article find links to article
methods, or analytical processes. All SCI must be handled within formal access control systems established by the Director of National Intelligence. SCI isVirtual security switch (850 words) [view diff] exact match in snippet view article find links to article
security technologies. Unlike physical networks that have switches with access control lists (ACLs), firewalls, antivirus gateways, or intrusion preventionMessage authentication code (1,918 words) [view diff] exact match in snippet view article find links to article
communications to distinguish it from the use of the latter as media access control address (MAC address). However, some authors use MIC to refer to a messageInitiative for Open Authentication (168 words) [view diff] no match in snippet view article find links to article
Initiative for Open Authentication (OATH) is an industry-wide collaboration to develop an open reference architecture using open standards to promote theRoad hierarchy (4,349 words) [view diff] exact match in snippet view article find links to article
geometric and operational characteristics, such as lane configuration and access control, and does not always form a strict hierarchy. While conceptually distinctFares and ticketing on the Mass Rapid Transit (Singapore) (3,118 words) [view diff] exact match in snippet view article
fares by restricting entry only through the fare gates, also known as access control gates. These gates, connected to a computer network, are able to readTime-Sensitive Networking (7,130 words) [view diff] case mismatch in snippet view article find links to article
endeavour since the technology required both changes in the Ethernet Media Access Control (MAC) scheme that is under the control of IEEE 802.3, as well as changesDigital identity (5,785 words) [view diff] no match in snippet view article find links to article
A digital identity is data stored on computer systems relating to an individual, organization, application, or device. For individuals, it involves theHTTP 404 (1,945 words) [view diff] exact match in snippet view article find links to article
Forbidden 404 Not Found 451 Unavailable for Legal Reasons Security access control methods Basic access authentication Digest access authentication SecuritySoftware token (567 words) [view diff] exact match in snippet view article find links to article
Ian T.; Clark, Russ; Owen, Henry (2018-02-01). "Advance reservation access control using software-defined networking and tokens". Future Generation ComputerCloud management (2,329 words) [view diff] exact match in snippet view article find links to article
include configuration and installation of images, access control, and budgeting and reporting. Access control often includes the use of Single sign-on (SSO)IEEE 802.11 (legacy mode) (988 words) [view diff] case mismatch in snippet view article
Metropolitan Area Networks- Specific Requirements Part Ii: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. (n.d.). doi:10.1109/ieeestdWS-Federation (121 words) [view diff] no match in snippet view article find links to article
WS-Federation (Web Services Federation) is an Identity Federation specification, developed by a group of companies: BEA Systems, BMC Software, CA Inc.Transaction authentication number (1,996 words) [view diff] no match in snippet view article find links to article
A transaction authentication number (TAN) is used by some online banking services as a form of single use one-time passwords (OTPs) to authorize financialSpring Security (819 words) [view diff] exact match in snippet view article find links to article
choice of Apache Ant paths or regular expressions. Used for specifying access control lists applicable to domain objects. Spring Security offers a repositoryDainfern (397 words) [view diff] exact match in snippet view article find links to article
trails and play parks. Security measures include 24/7 patrols, CCTV and access control. Dainfern publishes "In Focus", a monthly magazine exclusive to theService set (802.11 network) (2,086 words) [view diff] case mismatch in snippet view article
11-2007, § 7.3.2.1, p. 101. IEEE (2012). "Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Sponsored by the LAN/MANStephen Kent (network security) (587 words) [view diff] no match in snippet view article
including the design and development of network layer encryption and access-control systems and standards; secure transport layer protocols; secure e-mailCalDAV (461 words) [view diff] exact match in snippet view article find links to article
semantics to detect conflicting changes, or to provide locking. For access control the concept of ACLs are used, so each operation (view, edit, deleteMalaysian Expressway System (4,684 words) [view diff] exact match in snippet view article find links to article
four lanes (two in each direction) and should have full access control or partial access control. Most expressways in Malaysia are controlled-access expresswaysSPNEGO (505 words) [view diff] no match in snippet view article find links to article
Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO), often pronounced "spenay-go", is a GSSAPI "pseudo mechanism" used by client-server softwareGeneric Framing Procedure (406 words) [view diff] exact match in snippet view article find links to article
be protocol data unit (PDU) oriented (like IP/PPP or Ethernet media access control) or can be block-code oriented (like Fibre Channel). There are two modesWindows 9x (6,249 words) [view diff] exact match in snippet view article find links to article
Windows 9x offers share-level access control security for file and printer sharing as well as user-level access control if a Windows NT-based operatingProcessWire (1,115 words) [view diff] exact match in snippet view article find links to article
installations Use of string-based selectors for API calls Role-based access control system Core development emphasis on security Markup agnostic outputActive Directory Federation Services (584 words) [view diff] no match in snippet view article find links to article
applications located across organizational boundaries. It uses a claims-based access-control authorization model to maintain application security and to implementMedia Foundation (2,832 words) [view diff] exact match in snippet view article find links to article
HDTV), content protection and a more unified approach for digital data access control for digital rights management (DRM) and its interoperability. It integratesOutline of telecommunication (492 words) [view diff] case mismatch in snippet view article find links to article
Time-division multiplexing Statistical multiplexing and Packet switching Media Access Control Contention Token-based Centralized token control Distributed token controlLimited-access road (6,443 words) [view diff] exact match in snippet view article find links to article
partial" access control and "generally" has grade separations at intersections; a freeway is then defined as an expressway with full access control. Ohio'sEthernet flow control (1,231 words) [view diff] exact match in snippet view article find links to article
transmission of the sender for a specified period of time. A media access control (MAC) frame (EtherType 0x8808) is used to carry the pause command, withWS-Trust (349 words) [view diff] case mismatch in snippet view article find links to article
products that act as a Security Token Service, or STS. Microsoft's Access Control Services is one such service, available online today. PingIdentity CorporationEucalyptus (software) (2,245 words) [view diff] exact match in snippet view article
VM isolation. Access Control – A user of Eucalyptus is assigned an identity, and identities can be grouped together for access control. Eucalyptus hasJenkins (software) (1,398 words) [view diff] exact match in snippet view article
Jenkins' security depends on two factors: access control and protection from external threats. Access control can be customized via two ways: user authenticationBoa (web server) (188 words) [view diff] exact match in snippet view article
images. As of its last release, Boa has the following limitations: No access control features (HTTP Basic access authentication, etc.) No chroot option (planned)Bar gate (616 words) [view diff] case mismatch in snippet view article find links to article
Systems Interlocking System with a parking management system Bluetooth Access Control – Allows users to open the gate via a mobile app or paired BluetoothCommon Management Information Protocol (609 words) [view diff] exact match in snippet view article find links to article
directory. CMIP also provides good security (support authorization, access control, and security logs) and flexible reporting of unusual network conditionsKey escrow (565 words) [view diff] exact match in snippet view article find links to article
court), and granting of access by technical personnel charged with access control. All such linkages / controls have serious problems from a system designOberthur Technologies (459 words) [view diff] case mismatch in snippet view article find links to article
Financial Services, Machine-to-Machine, Digital Identity and Transport & Access Control. As of 2008, Oberthur's revenue was €882 million. Oberthur TechnologiesNeedham–Schroeder protocol (2,192 words) [view diff] no match in snippet view article find links to article
The Needham–Schroeder protocol is one of the two key transport protocols intended for use over an insecure network, both proposed by Roger Needham andVoluntary Voting System Guidelines (1,407 words) [view diff] exact match in snippet view article find links to article
logging Bases access control on voting stage (pre-voting, activated, suspended, post-voting) Does not require role-based access control (RBAC) RequiresOberthur Technologies (459 words) [view diff] case mismatch in snippet view article find links to article
Financial Services, Machine-to-Machine, Digital Identity and Transport & Access Control. As of 2008, Oberthur's revenue was €882 million. Oberthur TechnologiesIEEE 802.16 (822 words) [view diff] exact match in snippet view article find links to article
aspects of the air interface – the physical layer (PHY) and the media access control (MAC) layer. This section provides an overview of the technology employedAssa Abloy (1,690 words) [view diff] exact match in snippet view article find links to article
an undisclosed sum. In August 2022, ALCEA, a company specializing in access control solutions and catering to various vertical markets, was acquired byCNGrid (677 words) [view diff] exact match in snippet view article find links to article
RController provides many functions for resources like create, destroy, access control, access, read and write properties, etc. VO management Virtual organizationJalan Lama Alor Gajah (98 words) [view diff] exact match in snippet view article find links to article
Federal Route 191 was built under the JKR R5 road standard with partial access control, with a speed limit of 90 km/h. Statistik Jalan (Edisi 2013). KualaSecuritas AB (2,305 words) [view diff] exact match in snippet view article find links to article
first technical breakthrough in 1961 with the Securi-Coll automatic access control system. The company then introduced a payment system for petrol stationsMalaysia Federal Route 19 (193 words) [view diff] exact match in snippet view article find links to article
Melekek section and Taboh Naning–Ulu Kendong section) with partial access control, with a speed limit of 90 km/h. There is one overlap: Bulatan TabohAmazon S3 (1,908 words) [view diff] exact match in snippet view article find links to article
can be up to five terabytes in size. Requests are authorized using an access control list associated with each object bucket and support versioning whichMilitary road (189 words) [view diff] no match in snippet view article find links to article
an armed force of a country, which is usually responsible for its access, control, and maintenance. It is used mostly by soldiers, government officialsTime Slotted Channel Hopping (1,144 words) [view diff] exact match in snippet view article find links to article
low-power and lossy networks (LLNs) and aims at providing a reliable Media access control layer. TSCH can be seen as a combination of Time-division multiple accessChamberlain Group (450 words) [view diff] exact match in snippet view article find links to article
Products Systems Group, the largest wholesale distributor of perimeter access control equipment in the United States. In September 2021, The Duchossois GroupSQLite (3,319 words) [view diff] exact match in snippet view article find links to article
management, startup scripts, and password- or GRANT-based access control are unnecessary. Access control is handled through the file-system permissions of theEyetech (594 words) [view diff] exact match in snippet view article find links to article
code decoders and industrial (networked) shop floor data capture and access control systems. Eyetech took an interest in Amiga, as well as being a registeredStratus VOS (2,517 words) [view diff] exact match in snippet view article find links to article
inherited access control lists from Multics and also implements directory access control lists. If a file does not have an access control list, the containingFederal Protective Service (United States) (3,520 words) [view diff] exact match in snippet view article
a further 13,000 armed protective security officers (PSO) providing access control and security response within federal buildings. These PSOs are not federalKNX (2,011 words) [view diff] exact match in snippet view article find links to article
sits above the specific data link layers for each medium, provides access control and the logical link control; A network layer (for nodes with routingAce (disambiguation) (1,499 words) [view diff] exact match in snippet view article
renin–angiotensin system (RAS), which controls blood pressure Access Control Entry, part of an access control list ACE (compressed file format) Ace (editor), a codeDRM (293 words) [view diff] exact match in snippet view article find links to article
rights movement Disaster risk management Digital rights management, access control technologies that limit the usage of digital content and devices "DigitalDublin Harbour Police (237 words) [view diff] exact match in snippet view article find links to article
a voluntary arrangement of over 200,000 euro paid to each officer) Access control will be undertaken by contracted private security companies, howeverTime clock (2,009 words) [view diff] exact match in snippet view article find links to article
the system. Biometric readers are often used in conjunction with an access control system, granting the user access to a building, and at the same timeDublin Harbour Police (237 words) [view diff] exact match in snippet view article find links to article
a voluntary arrangement of over 200,000 euro paid to each officer) Access control will be undertaken by contracted private security companies, howeverDRM (293 words) [view diff] exact match in snippet view article find links to article
rights movement Disaster risk management Digital rights management, access control technologies that limit the usage of digital content and devices "DigitalChattr (713 words) [view diff] exact match in snippet view article find links to article
in a Unix system chmod – change file access control attributes in a Unix system cacls – change file access control lists in Microsoft Windows NT chmod(1) – illumosAbandonware (7,904 words) [view diff] case mismatch in snippet view article find links to article
to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies In November 2006 the Library of Congress approved an exemptionGPRS (3,499 words) [view diff] case mismatch in snippet view article find links to article
- Base Station System (BSS) interface; Radio Link Control / Medium Access Control (RLC/MAC) protocol; section 10.0a.1 - GPRS RLC/MAC block for data transfer"Data set (IBM mainframe) (1,572 words) [view diff] case mismatch in snippet view article
running program they are stored in the Data Control Block (DCB) or Access Control Block (ACB), which are data structures used to access data sets usingWebDAV (1,776 words) [view diff] exact match in snippet view article find links to article
RFC 3648, issued December 2003 the access control protocol: "Web Distributed Authoring and Versioning (WebDAV) Access Control Protocol" RFC 3744, issued MayCourthouse (1,698 words) [view diff] exact match in snippet view article find links to article
the court have entered the building through security screenings and access control checkpoints, the circulation systems of passageways through the buildingSoftwell Maker (1,194 words) [view diff] case mismatch in snippet view article find links to article
databases simultaneously; Production and consumption of Web services; Access Control, and audit logs; Support for HTTPS and client authentication; ExportingNiels Provos (688 words) [view diff] exact match in snippet view article find links to article
including the libevent event driven programming system, the Systrace access control system, the honeyd honeypot system, the StegDetect steganography detectorFoswiki (1,449 words) [view diff] exact match in snippet view article find links to article
include an auditable version control system, user authentication, an access control system, cross-site request forgery protection, and improved spam-preventionApache Jackrabbit (261 words) [view diff] exact match in snippet view article find links to article
queries Unstructured content Import and export Referential integrity Access control Versioning JTA support Observation Locking Clustering Multiple persistenceOnline identity management (1,540 words) [view diff] exact match in snippet view article find links to article
important building block of cybersecurity. It forms the basis for most access control types and establishing accountability online. One aspect of the onlineHTTP 403 (654 words) [view diff] exact match in snippet view article find links to article
Forbidden 404 Not Found 451 Unavailable for Legal Reasons Security access control methods Basic access authentication Digest access authentication SecurityStarLAN (809 words) [view diff] case mismatch in snippet view article find links to article
members of the IEEE 802.3 standards committee as the Twisted Pair Medium Access Control sublayer and Physical Signalling sublayer specification in section 12Internet Archive (13,390 words) [view diff] case mismatch in snippet view article find links to article
to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies". Federal Register. 71 (227): 68472–68480. Archived fromArchitecture of Windows NT (4,217 words) [view diff] exact match in snippet view article find links to article
resource can be accessed, via the use of access control lists (ACLs), which are themselves made up of access control entries (ACEs). ACEs contain a SecurityDecentralized identifier (713 words) [view diff] no match in snippet view article find links to article
A decentralized identifier (DID) is a type of globally unique identifier that enables an entity to be identified in a manner that is verifiable, persistentMicrosoft Fingerprint Reader (337 words) [view diff] no match in snippet view article find links to article
Microsoft Fingerprint Reader was a device sold by Microsoft, primarily for homes and small businesses. The underlying software providing the biometrics48-bit computing (398 words) [view diff] exact match in snippet view article find links to article
expand this without breaking properly written applications. The media access control address (MAC address) of a network interface controller uses a 48-bitMTR Properties (140 words) [view diff] case mismatch in snippet view article find links to article
Properties is also a property agent, and provide services on Octopus Access Control System and environmental hygiene service. It operates the followingGeneral protection fault (1,262 words) [view diff] no match in snippet view article find links to article
its use However, many modern operating systems implement their memory access-control schemes via paging instead of segmentation, so it is often the caseAnti-circumvention (2,541 words) [view diff] exact match in snippet view article find links to article
matter is controlled by the rights holders through application of an access control or protection process, such as encryption, scrambling or other transformationRadSec (260 words) [view diff] no match in snippet view article find links to article
RadSec is a protocol for transporting RADIUS datagrams over TCP and TLS. The RADIUS protocol is a widely deployed authentication and authorization protocolXMLHttpRequest (1,207 words) [view diff] exact match in snippet view article find links to article
Forbidden 404 Not Found 451 Unavailable for Legal Reasons Security access control methods Basic access authentication Digest access authentication SecurityUser-Managed Access (1,514 words) [view diff] case mismatch in snippet view article find links to article
[citation needed] UMA also does not use or depend on the eXtensible Access Control Markup Language (XACML) as a means of encoding user policy or requestingYubiKey (2,957 words) [view diff] no match in snippet view article find links to article
The YubiKey is a hardware authentication device manufactured by Yubico to protect access to computers, networks, and online services that supports one-timeYubiKey (2,957 words) [view diff] no match in snippet view article find links to article
The YubiKey is a hardware authentication device manufactured by Yubico to protect access to computers, networks, and online services that supports one-timeUnique identifier (710 words) [view diff] exact match in snippet view article find links to article
are guaranteed to be globally unique. Examples include (1) the media access control address MAC address uniquely assigned to each individual hardware networkNational Highway 751 (India) (220 words) [view diff] case mismatch in snippet view article
has 250 Meter wide alignment for the central spine road, NH 751 is access Control Express way and is elevated at most of the junctions it connects (NariStrike (685 words) [view diff] exact match in snippet view article find links to article
unit of volume, typically equivalent to two bushels Electric strike, access control device used for doors Lightning strike, electrical discharges causedRegimental police (1,398 words) [view diff] exact match in snippet view article find links to article
within the unit according to their rank, or deployed solely to perform access control into the base at key entry points. In the Sri Lanka Army, regimentsSam Jones Expressway (430 words) [view diff] exact match in snippet view article find links to article
Raymond Street Expressway) is a 4-lane divided highway with partial access control (urban expressway) in the city of Indianapolis. Renamed in 2007 to honorNTLMSSP (99 words) [view diff] no match in snippet view article find links to article
NTLMSSP (NT LAN Manager (NTLM) Security Support Provider) is a binary messaging protocol used by the Microsoft Security Support Provider Interface (SSPI)Webhook (526 words) [view diff] case mismatch in snippet view article find links to article
DocuSign, Inc. Retrieved January 15, 2020. Mutual TLS plus Client Access Control enables your listener app to ensure that the Connect notification messageNetwork allocation vector (324 words) [view diff] no match in snippet view article find links to article
The network allocation vector (NAV) is a virtual carrier-sensing mechanism used with wireless network protocols such as IEEE 802.11 (Wi-Fi) and IEEE 802Receptionist (1,103 words) [view diff] exact match in snippet view article find links to article
lobby area tidy. A receptionist may also assume some security guard access control functions for an organization by verifying employee identification,Trivial File Transfer Protocol (1,750 words) [view diff] exact match in snippet view article find links to article
includes no login or access control mechanisms. Care must be taken when using TFTP for file transfers where authentication, access control, confidentialityEnterprise portal (1,199 words) [view diff] exact match in snippet view article find links to article
often based on your role or job function within the portal context. Access control — the ability for portal to limit specific types of content and servicesAutomated fingerprint identification (1,102 words) [view diff] exact match in snippet view article find links to article
closely related technique used in applications such as attendance and access control systems. On a technical level, verification systems verify a claimedData security (1,394 words) [view diff] exact match in snippet view article find links to article
controllers making illegal access to data impossible. Hardware-based access control is more secure than the protection provided by the operating systemsDCF Interframe Space (141 words) [view diff] no match in snippet view article find links to article
The IEEE 802.11 family of standards describe the DCF protocol, which controls access to the physical medium. A station must sense the status of the wirelessWi-Fi (12,881 words) [view diff] exact match in snippet view article find links to article
Logical Link Control (LLC) specified by IEEE 802.2 employs Wi-Fi's media access control (MAC) protocols to manage retries without relying on higher levels ofKeeLoq (1,561 words) [view diff] exact match in snippet view article find links to article
KeeLoq RFID technology. Their attack works on all known car and building access control systems that rely on the KeeLoq cipher. The attack by the Bochum teamNetwork topology (5,238 words) [view diff] exact match in snippet view article find links to article
aircraft. Logical topologies are often closely associated with media access control methods and protocols. Some networks are able to dynamically changeComparison of download managers (484 words) [view diff] no match in snippet view article find links to article
browser ZIP preview Add-on support Scheduler Checksum verification Remote Access/Control Modified Timestamp preserved BitComet Yes Yes Yes ? Yes ? Yes ? YesIris recognition (6,115 words) [view diff] no match in snippet view article find links to article
such devices unsuitable for unsupervised applications, such as door access-control systems. However, this is not the case with all iris recognition algorithmsSPA Highway (159 words) [view diff] exact match in snippet view article find links to article
the JKR R5 road standard as a dual-carriageway highway with partial access control, with a speed limit of 90 km/h. There are no overlaps, alternate routesIEEE 802.11n-2009 (4,501 words) [view diff] exact match in snippet view article find links to article
headers (Preamble + PLCP) and acknowledgment frames. The main media access control (MAC) feature that provides a performance improvement is aggregationWIPO Copyright and Performances and Phonograms Treaties Implementation Act (2,645 words) [view diff] no match in snippet view article find links to article
exceptions. The act creates a distinction between access-control measures and copy-control measures. An access-control measure limits access to the contents ofXsan (740 words) [view diff] exact match in snippet view article find links to article
Macintosh computers as a Universal binary and supports file system access control lists. On December 5, 2006, Apple released Xsan 1.4.1. On October 18Bosch (company) (5,324 words) [view diff] exact match in snippet view article
intrusion detection, fire detection, and voice-alarm systems, as well as access control and professional audio and conference systems. The Thermotechnik GmbHIdentity driven networking (622 words) [view diff] exact match in snippet view article find links to article
to rely upon authentication technologies for the provisioning of an access control policy. For instance; Packet filtering -firewall, content-control softwareLuzhniki Stadium (3,452 words) [view diff] exact match in snippet view article find links to article
During the World Cup, Luzhniki had six access control stations with 39 inspection lines, and seven access control points with 427 entrances for fans arrivingGraham–Denning model (416 words) [view diff] exact match in snippet view article find links to article
addresses how to assign specific access rights. It is mainly used in access control mechanisms for distributed systems. There are three main parts to thePre-boot authentication (628 words) [view diff] no match in snippet view article find links to article
Pre-boot authentication (PBA) or power-on authentication (POA) serves as an extension of the BIOS, UEFI or boot firmware and guarantees a secure, tamper-proofComparison of privilege authorization features (2,340 words) [view diff] no match in snippet view article find links to article
A number of computer operating systems employ security features to help prevent malicious software from gaining sufficient privileges to compromise theLogicLocker (587 words) [view diff] case mismatch in snippet view article find links to article
changes, disabling of unused ports and protocols and implementation of Access Control Lists (ACL), maintaining proper backups and firmware updates shouldAttribute-based encryption (1,325 words) [view diff] exact match in snippet view article find links to article
generalisation of public-key encryption which enables fine grained access control of encrypted data using authorisation policies. The secret key of aPre-boot authentication (628 words) [view diff] no match in snippet view article find links to article
Pre-boot authentication (PBA) or power-on authentication (POA) serves as an extension of the BIOS, UEFI or boot firmware and guarantees a secure, tamper-proofMulti-Choice TV (551 words) [view diff] exact match in snippet view article find links to article
decode their signal which is based on Nagravision which is a conditional access control system developed by the Kudelski Group. In order to prevent such activityComparison of privilege authorization features (2,340 words) [view diff] no match in snippet view article find links to article
A number of computer operating systems employ security features to help prevent malicious software from gaining sufficient privileges to compromise thePoken (706 words) [view diff] exact match in snippet view article find links to article
NFC interactive USB devices, lead generation devices, gamification, access control, and metrics reporting. The company, Poken S.A., was founded in DecemberMobile content management system (501 words) [view diff] exact match in snippet view article find links to article
can be applied. Access control includes authorization, authentication, access approval to each content. In many cases the access control also includes downloadToken (376 words) [view diff] exact match in snippet view article find links to article
its bearer Access token, a system object representing the subject of access control operations Tokenization (data security), the process of substitutingOrganizationally unique identifier (3,322 words) [view diff] no match in snippet view article find links to article
An organizationally unique identifier (OUI) is a 24-bit number that uniquely identifies a vendor, manufacturer, or other organization. OUIs are purchasedCacti (software) (1,307 words) [view diff] case mismatch in snippet view article
supports both User and User Groups security models and supports Role Based Access Control (RBAC) for access to not only monitoring data, but various areas ofWide Mouth Frog protocol (427 words) [view diff] no match in snippet view article find links to article
The Wide-Mouth Frog protocol is a computer network authentication protocol designed for use on insecure networks (the Internet for example). It allowsUnikernel (1,115 words) [view diff] exact match in snippet view article find links to article
hardware or talk network protocols; a set of policies that enforce access control and isolation in the application layer. The library OS architectureObject-capability model (1,026 words) [view diff] exact match in snippet view article find links to article
scientist E. Dean Tribble stated that in smart contracts, identity-based access control did not support well dynamically changing permissions, compared to theComparison of shopping cart software (925 words) [view diff] exact match in snippet view article find links to article
Access control list Form CAPTCHA Staff action logging PA/DSS certified Apache OFBiz Yes Yes Yes No BigCommerce Yes Yes Yes No Drupal Commerce Yes add-onAttribute-based encryption (1,325 words) [view diff] exact match in snippet view article find links to article
generalisation of public-key encryption which enables fine grained access control of encrypted data using authorisation policies. The secret key of aEBeam (232 words) [view diff] exact match in snippet view article find links to article
where an interactive stylus or marker could be used to add notes, access control menus, manipulate images, and create diagrams and drawings. The presentationsFTP bounce attack (156 words) [view diff] no match in snippet view article find links to article
to port scan hosts discreetly, and to potentially bypass a network's access-control list to access specific ports that the attacker cannot access throughArmy Knowledge Online (1,178 words) [view diff] exact match in snippet view article find links to article
process management and collaboration across AKO. Users can build custom access control lists for each piece of content they own to determine the audience allowedProtected mode (4,371 words) [view diff] exact match in snippet view article find links to article
language Intel Ring (computer security) x86 assembly language "Memory access control method and system for realizing the same". US Patent 5483646. May 23Broadband over power lines (2,735 words) [view diff] exact match in snippet view article find links to article
Medium Access Control and Physical Layer Specifications" is a working group for delivering broadband over power lines. The aim is to define medium access controlGOV.UK Verify (1,940 words) [view diff] no match in snippet view article find links to article
GOV.UK Verify was an identity assurance system developed by the British Government Digital Service (GDS) which was in operation between May 2016 and AprilXOOPS (571 words) [view diff] exact match in snippet view article find links to article
required for running a web-based content management system. Advanced access control layer Administrators have the ability to grant specific groups of usersComputational trust (3,088 words) [view diff] no match in snippet view article find links to article
In information security, computational trust is the generation of trusted authorities or user trust through cryptography. In centralised systems, securityDaisy chain (electrical engineering) (834 words) [view diff] case mismatch in snippet view article
Little (1997). Security, ID Systems and Locks: The Book on Electronic Access Control. p. 170: daisy chain loop illustration. Look up daisy chain in WiktionaryISO/IEC 27001 (1,497 words) [view diff] exact match in snippet view article find links to article
These controls address various aspects of information security, such as access control, cryptography, physical security, and incident management. ISO/IEC 27001OpenDJ (1,110 words) [view diff] exact match in snippet view article find links to article
(DSMLv2). Written in Java, OpenDJ offers multi-master replication, access control, and many extensions. OpenDJ began as a fork of OpenDS, an LDAP / DSMLAuth-Code (538 words) [view diff] no match in snippet view article find links to article
An Auth-Code, also known as an EPP code, authorization code, transfer code, or Auth-Info Code, is a generated passcode required to transfer an InternetInstallable File System (1,185 words) [view diff] case mismatch in snippet view article find links to article
improved performance and added some features, like variable size cache and Access Control Lists, and was available only in certain OS/2 server editions. The FATPort of Sines (764 words) [view diff] exact match in snippet view article find links to article
such as: control of maritime traffic; pilotage, towage and mooring; access control and surveillance; drinking water and bunkers; prevent accidents/pollution;UL (safety organization) (2,923 words) [view diff] case mismatch in snippet view article
and Power Supply Cords UL 2556, Wire and Cable Test Methods UL 294, Access Control System Units (ANSI Approved: May 24, 2023) UL 365, Standard for PoliceCp (Unix) (745 words) [view diff] exact match in snippet view article
The copy also receives other metadata from the original including access control protection. cp -p smith smith.jr This reclusively copies the directory.NET Remoting (760 words) [view diff] exact match in snippet view article find links to article
calls can be implemented using threading libraries. Authentication and access control can be implemented for clients by either using custom Channels or byACL (335 words) [view diff] no match in snippet view article find links to article
Australian Christian Lobby, a right wing Christian campaigning group Access-control list in computer security ACL2, theorem prover Agent CommunicationsUnited States Uniformed Services Privilege and Identification Card (976 words) [view diff] exact match in snippet view article find links to article
works with specialized card readers for use with automatic building access control systems, communications encryption, and computer access. U.S. military