All > Technology > Collaboration > SharePoint
The mechanisms for limiting access to certain information based on a user's identity and membership in various predefined groups. Access control can be mandatory, discretionary, or role-based.
- Browse Related Terms: access control, access control entry (ACE), access control list (ACL), access mask, ACE, ACL, cache, OLE DB, rights
All > Technology > E-mail > Lotus Domino
In computer security, the process of ensuring that users can access only those resources of a computer system for which they are authorized.
- Browse Related Terms: access control, ACL (Access Control List), Authentication, command key, Digital Signature, keyboard shortcut, private key, public key, Public Key Cryptography, Secure/MIME (S/MIME), SLIP/PPP, SOCKS (Sockets Secure), symmetric encryption
All > Technology > E-mail > Microsoft Email > Microsoft Exchange > Microsoft Exchange 2003
The security mechanism in Windows Server(tm) 2003 that limits access to information, objects, or controls for designated users and groups. [Exchange 2003]
- Browse Related Terms: access control, ACE (access control entry), ACL (Access Control List), DACL (discretionary access control list), Delegation, Policy, privilege, security context, security descriptor
All > Technology > E-mail > Microsoft Email > Microsoft Exchange > Microsoft Exchange 2007
A security mechanism that determines which operations a user, group, service, or computer is authorized to perform on a computer or on a particular object, such as a file, printer, registry subkey, or directory service object. [Exchange 2007]
- Browse Related Terms: access control, ACE (access control entry), Active Directory, Active Directory Domain Services (AD DS), Active Directory Service Interfaces, ADSI (Active Directory Service Interfaces), DACL (discretionary access control list), DNS (Domain Name System), mail user, Mailbox, mailbox user, property set, recipient
All > Technology > Operating System > Microsoft Windows > Microsoft Windows Server > Microsoft Active Directory
The management of permissions for logging on to a computer or network.
- Browse Related Terms: access control, access control entry (ACE), access control list (ACL), access token, Firewall, group, Group memberships, Network Service account, Owner, Permissions, security context, security descriptor, Security Groups, security identifier (SID), Security principal, Security protocol, service account, user account
All > Technology > Programming > Java
The methods by which interactions with resources are limited to collections of users or programs for the purpose of enforcing integrity, confidentiality, or availability constraints.
- The methods by which interactions with resources are limited to collections of users or programs for the purpose of enforcing integrity, confidentiality, or availability constraints.
- Browse Related Terms: access control, authorization, authorization constraint, group, Realm, role (security), security constraint, security policy domain, security role, security technology domain, security view
All > Technology > Security
The process of granting or denying specific requests: 1) for obtaining and using information and related information processing services; and 2) to enter specific physical facilities (e.g., Federal buildings, military establishments, and border crossing entrances).
- Browse Related Terms: access control, Audit Data, Audit Reduction Tools, cold site, Disaster Recovery Plan (DRP), Disruption, Executive Agency, hot site, National Security Emergency Preparedness Telecommunications Services, Security Policy
All > Technology > Telecommunications
1. A service feature or technique used to permit or deny use of the components of a communication system. 2. A technique used to define or restrict the rights of individuals or application programs to obtain data from, or place data onto, a storage device. 3. The definition or restriction of the rights of individuals or application programs to obtain data from, or place data into, a storage device. 4. Limiting access to information system resources only to authorized users, programs, processes, or other systems. [INFOSEC-99] 5. That function performed by the resource controller that allocates system resources to satisfy user requests. 6. Control over the flow of information between entities [CESG]. 7. The prevention of access without access rights [CESG]. 8. The prevention of use of a resource by unidentified and/or authorized entities in any other than an authorized manner [ECMATR46]. 9. The prevention of unauthorized use of a resource including the prevention of use of a resource in an unauthorized manner. [7498-2]. 10. The prevention of unauthorized access of subjects to objects [POSIX.6].
- Browse Related Terms: access control, access-denial time, anti-spoof, authenticate, fetch protection, NANPA (North American Numbering Plan Administration), network weaving, password, real-time reaction, Spoofing, trusted identification forwarding