-
1 действия по управлению достоверной идентичностью
Русско-английский словарь нормативно-технической терминологии > действия по управлению достоверной идентичностью
См. также в других словарях:
Identity correlation — Definition In information systems, identity correlation is a process that reconciles and validates the proper ownership of disparate user account login IDs (user names) that reside on systems and applications throughout an organization and can… … Wikipedia
Identity Cards Act 2006 — The Identity Cards Act 2006[1] Parliament of the United Kingdom Long title An Act to make provision for a national scheme of registration of individuals … Wikipedia
Customer relationship management — (CRM) is a widely implemented strategy for managing a company’s interactions with customers, clients and sales prospects. It involves using technology to organize, automate, and synchronize business processes principally sales activities, but… … Wikipedia
British national identity card — Enabling legislation for the British national identity card was passed under the Identity Cards Act 2006. [ [http://www.opsi.gov.uk/ACTS/acts2006/20060015.htm Identity Cards Act 2006] , Office of Public Sector Information, accessed 14 October… … Wikipedia
действия по управлению достоверной идентичностью — МСЭ Т X.1250 [http://www.rfcmd.ru/glossword/1.8/index.php?a=index d=4878] Тематики защита информации EN trusted identity management activities … Справочник технического переводчика
Security token — Several types of security tokens with a penny for scale … Wikipedia
The Open Group — is a vendor and technology neutral industry consortium, currently with over three hundred member organizations.[1] It was formed in 1996 when X/Open merged with the Open Software Foundation. Services provided include strategy, management,… … Wikipedia
Privacy enhancing technologies — (PET) is a general term for a set of computer tools, applications and mechanisms which when integrated in online services or applications, or when used in conjunction with such services or applications allow online users to protect the privacy of … Wikipedia
December 2010 — was the twelfth month of that year. It began on a Wednesday and ended after 31 days on a Friday. Portal:Current events This is an archived version of Wikipedia s Current events Portal from December 2010 … Wikipedia
DigiNotar — BV Former type Subsidiary of a publicly traded company Industry Internet security Fate acquired by VASCO Data Security International in 2010; declared bankrupt in 2011 Founded 1997 Founder(s) Dick Batenburg … Wikipedia
Computer security — This article is about computer security through design and engineering. For computer security exploits and defenses, see computer insecurity. Computer security Secure operating systems Security architecture Security by design Secure coding … Wikipedia