All > Technology > E-mail > Lotus Domino
In computer security, a list associated with an object that identifies all the subjects that can access the object and their access rights.
- Browse Related Terms: access control, ACL (Access Control List), Authentication, command key, Digital Signature, keyboard shortcut, private key, public key, Public Key Cryptography, Secure/MIME (S/MIME), SLIP/PPP, SOCKS (Sockets Secure), symmetric encryption
All > Technology > E-mail > Microsoft Email > Microsoft Exchange > Microsoft Exchange 2003
A list of security protections that apply to an entire object, or a set of the object's properties, or an individual property of an object. There are two types of access control lists: discretionary and system. [Exchange 2003]
- Browse Related Terms: access control, ACE (access control entry), ACL (Access Control List), DACL (discretionary access control list), Delegation, Policy, privilege, security context, security descriptor
All > Technology > E-mail > Microsoft Email > Microsoft Exchange > Microsoft Exchange 2007
A list of security protections that apply to an entire object, a set of the object's properties, or an individual property of an object. There are two types of access control lists: discretionary and system. [Exchange 2007]
- Browse Related Terms: ACL (Access Control List), disclaimer, EXCH50 binary large object, fallback action, GAL (global address list), GUID (globally unique identifier), Microsoft Exchange Troubleshooting Assistant, predicate, Queue Viewer, Replication ID, rule, rule collection, Security Exchange Commission Rule 17a-4 (SEC Rule 17 A-4), transport rule
Also listed in:
- All > Law > E-Discovery
- All > Technology > Storage