- User Access Control
- Office equipment: UAC (http://www.microsoft.com/rus/technet/technetmag/issues/2006/11/Deployment/default.aspx)
Универсальный русско-английский словарь. Академик.ру. 2011.
Универсальный русско-английский словарь. Академик.ру. 2011.
User Account Control — (UAC) is a technology and security infrastructure introduced with Microsoft s Windows Vista operating system. It aims to improve the security of Microsoft Windows by limiting application software to standard user privileges until an administrator … Wikipedia
User Account Control — UAC (User Account Control) компонент Microsoft Windows, впервые появившийся в Windows Vista. Этот компонент запрашивает подтверждение действий, требующих прав администратора, в целях защиты от несанкционированного использования компьютера.… … Википедия
User Account Control — (UAC, contrôle du compte de l utilisateur), est un mécanisme de protection des données introduit dans les systèmes d exploitations Windows Vista et 7. UAC est aussi connu sous ses dénominations précédentes durant le développement de Windows Vista … Wikipédia en Français
Access control — is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical… … Wikipedia
Access control list — In computer security, an access control list (ACL) is a list of permissions attached to an object. The list specifies who or what is allowed to access the object and what operations are allowed to be performed on the object. In a typical ACL,… … Wikipedia
access control list — noun A security scheme for file level security (as opposed to traditional user, group levels, or the somewhat stricter role levels.) Abbreviated ACL. The hackers broke through the B security model, so no more role level security; all critical… … Wiktionary
Mandatory access control — In computer security, mandatory access control (MAC) refers to a type of access control by which the operating system constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target.… … Wikipedia
Network Access Control — (NAC) is an approach to computer network security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security… … Wikipedia
Discretionary access control — In computer security, discretionary access control (DAC) is a kind of access control defined by the Trusted Computer System Evaluation Criteria[1] as a means of restricting access to objects based on the identity of subjects and/or groups to… … Wikipedia
access control list — Abbreviated ACL. A list or table containing information about the users, processes, and objects that can access a specific file or object. ACLs are usually attached to file system directories, and they specify access permissions such as read,… … Dictionary of networking
Role-based access control — In computer systems security, role based access control (RBAC) [cite conference author = Ferraiolo, D.F. and Kuhn, D.R. title = Role Based Access Control booktitle=15th National Computer Security Conference year = 1992 month = October pages=554… … Wikipedia