-
1 attribute-based access control
управление доступом на основе атрибутов (на уровне атрибутов)Англо-русский словарь по компьютерной безопасности > attribute-based access control
-
2 control
1) управление2) контроль, проверкаАнгло-русский словарь по компьютерной безопасности > control
-
3 code
1) код || кодировать3) (машинная) программа || программировать4) код, (машинное) слово (напр., команда)•- absolute code
- abstract code
- access code - address code
- alphanumeric code
- alphameric code
- alphabetical code
- alphabetic code
- amplitude code
- ASA code
- attribute-control code
- augmented operation code - balanced code
- bar code
- baseline code
- basic code
- basic order code
- Baudot code
- binary code
- binary decimal code
- binary-coded decimal code
- biquinary code
- block code
- block structured code
- Bose-Chaudhuri code
- brevity code
- bug-arresting code
- burst error correcting code
- cable code
- call directing code
- call direction code- cap code- character code
- check code
- checkable code
- Chinese binary code
- color code
- column binary code
- comma-free code
- command code
- compiler-produced code
- completion code
- computer code
- conditional code
- condition code
- constant ratio code
- continuous progressive code - convolution code
- convolutional code
- correcting code- CP code- cyclic code
- cyclic permuted code
- data code
- data conversion code
- data link code - dense binary code
- deposited source code
- destination code
- device code
- digital code
- direct code
- directing character code
- dot-and-dash code
- double-error correcting code
- eight channel code
- entry code - error-checking code
- error-control code
- error-correcting code
- error-detecting code
- error-detection code
- error-limited code
- escape code - executable code
- exit code
- exponent code
- extended mneminic code
- external readable code
- factorable code
- false code
- fault code
- feature code
- Fire code
- five bit code
- five channel code
- forbidden-character code
- forbidden code
- format code
- four-adress code
- fragile code
- frequency code
- function code
- Gray code
- group code
- Hamming code
- hash code - Huffman code
- identification code
- identifying code
- illegal code
- improper code
- in-line code
- inner code
- instantaneously decodable code
- instruction code
- internal code
- interpretive code
- inverted code - line code
- linear code
- line-feed code
- lock code
- machine code
- machine-instruction code
- machine-language code
- machine-operation code
- machine-readable code
- machine-treatable code
- magnetic bar code
- magnetic tape code
- Manchester code
- message-format code
- micro code
- minimum-access code
- minimum-delay code
- minimum-distance code
- minimum-latency code
- minimum-redundance code
- mnemonic code
- modified binary code
- modular code
- modulation code - Muller code
- multiple-address code
- multiple-error correcting code
- N-adjacent code
- name code
- N-ary code
- native code
- natural binary code
- N-bit code
- N-error correcting code
- N-level code
- noise combating code
- nonconsistently based code
- nonexistent code
- nonprint code
- nonreproducing code
- non-return-to-zero code
- nonsystematic code
- nonweighted code
- N-place code
- number address code
- number code
- numerical code
- numeric code
- N-unit code
- object code
- one-address code
- one-dimensional code
- one-level code
- one-out-of-ten code
- op code
- operand code
- operation code
- optimum code
- order code
- outer code
- own code
- paired-disparity code
- paper tape code
- parallel code
- parity-checking code
- parity-check code
- perforated tape code
- permutation code
- permuted code
- personal-identification code
- phonetic code
- physical-hardware-dependent code- positional code- position code
- position-independent code
- precedence code
- print restore code - pseudocyclic code
- pseudorandom code
- pulse code
- punched card code
- punched tape code
- pure code
- quibinary code
- ready-to-run code
- recurrent code
- redundant code
- Reed-Muller code
- Reed-Solomon code
- reenterable code
- reentrant code
- reflected binary code
- reflected code
- relative code
- relocatable code
- repertory code
- reproducing code
- residual class code
- residue code
- restricted-magnitude-error correcting code
- retrieval code
- return code
- return-to-zero code
- routing code
- row-binary code
- safety code - self-checking code
- self-complementaring code
- self-complementing code
- self-correcting code
- self-demarcating code
- separable code
- serial code - severity code
- Shannon code
- short computer code
- short code
- sign code
- signal code
- significant-digit subset code - single-address code
- single-error correcting and double-error detecting code
- single-error correcting code
- single-error detecting code
- single-parity code - skip code
- source code
- space code
- space-efficient code
- specific code - status code
- Stone's code
- stop code
- straight binary code
- straight-line code
- strip code
- syllable code
- symbol code
- symbolic code
- systematic error checking code
- tape code
- task code
- telecommunication code
- telegraph code
- teleprinter code
- teletype code
- ternary code
- threaded code
- three-adress code
- throw-away code
- time code
- timing code
- trace back code
- transmission code
- transmitter-start code
- triple-error correcting code
- two-address code
- two-out-of-five code
- two-rail code
- uniquely decipherable code
- uniquely decodable code
- unitary code
- unit-distance code
- unused code
- variable-length code
- viral code - weighted code
- weighted-checksum code - zero-address code
- zone codeEnglish-Russian dictionary of computer science and programming > code
См. также в других словарях:
Role-based access control — In computer systems security, role based access control (RBAC) [cite conference author = Ferraiolo, D.F. and Kuhn, D.R. title = Role Based Access Control booktitle=15th National Computer Security Conference year = 1992 month = October pages=554… … Wikipedia
Control table — This simple control table directs program flow according to the value of the single input variable. Each table entry holds a possible input value to be tested for equality (implied) and a relevant subroutine to perform in the action column. The… … Wikipedia
Lightweight Directory Access Protocol — The Lightweight Directory Access Protocol (LDAP; /ˈɛld … Wikipedia
Diameter Credit-Control Application — Diameter Credit Control Application, is a networking protocol for Diameter application used to implement real time credit control for a variety of end user services. It is an IETF standard defined in RFC 4006. Contents 1 Purpose 1.1 Session based … Wikipedia
Class-based programming — Programming paradigms Agent oriented Automata based Component based Flow based Pipelined Concatenative Concurrent computin … Wikipedia
Comparison of revision control software — The following is a comparison of revision control software. The following tables includes general and technical information for notable revision control and software configuration management (SCM) software. This is an incomplete list, which may… … Wikipedia
Illinois Security Lab — The Illinois Security Lab is a research laboratory at the University of Illinois Urbana Champaign established in 2004 to support research and education in computer and network security. The lab is part of the UIUC Computer Science Department and… … Wikipedia
IBM Tivoli Access Manager — is an authentication and authorization solution for corporate web services, operating systems, and existing applications. [http://publib.boulder.ibm.com/infocenter/tivihelp/v2r1/topic/com.ibm.itame.doc/am61 admin18.htm#choverview] Tivoli Access… … Wikipedia
PERMIS — (PrivilEge and Role Management Infrastructure Standards) is a sophisticated policy based authorisation system that implements an enhanced version of the U.S. National Institute of Standards and Technology (NIST) standard Role Based Access Control … Wikipedia
Identity correlation — Definition In information systems, identity correlation is a process that reconciles and validates the proper ownership of disparate user account login IDs (user names) that reside on systems and applications throughout an organization and can… … Wikipedia
RSBAC — (Rule Set Based Access Control) is an open source access control framework for current Linux kernels, which has been in stable production use since January 2000 (version 1.0.9a). Features*Free open source (GPL) Linux kernel security extension.… … Wikipedia