All > Technology > Programming > Java
The methods by which interactions with resources are limited to collections of users or programs for the purpose of enforcing integrity, confidentiality, or availability constraints.
- The methods by which interactions with resources are limited to collections of users or programs for the purpose of enforcing integrity, confidentiality, or availability constraints.
- Browse Related Terms: access control, authorization, authorization constraint, group, Realm, role (security), security constraint, security policy domain, security role, security technology domain, security view
Also listed in:
- All > Technology > Collaboration > SharePoint
- All > Technology > E-mail > Lotus Domino
- All > Technology > E-mail > Microsoft Email > Microsoft Exchange > Microsoft Exchange 2003
- All > Technology > E-mail > Microsoft Email > Microsoft Exchange > Microsoft Exchange 2007
- All > Technology > Operating System > Microsoft Windows > Microsoft Windows Server > Microsoft Active Directory
- All > Technology > Security
- All > Technology > Telecommunications