-
1 lattice security model
Англо-русский словарь по компьютерной безопасности > lattice security model
-
2 model
-
3 file
1) папка(-регистратор), скоросшиватель || регистрировать; хранить документы в определённом порядке2) дело; подшитые документы || подшивать3) картотека, архив || составлять картотеку5) вчт. файл || записывать (заносить) в файл6) напильник; надфиль || обрабатывать напильником, затачивать напильником; опиливать7) ряд•to file away — сдавать в архив;to close a file — закрывать файл;to establish a file — создавать файл;to mark a file — размечать файл;to open a file — открывать файл-
active file
-
aircraft's file
-
amendments file
-
angular file
-
arch file
-
arm file
-
backup file
-
barrette file
-
bastard file
-
batch file
-
blunt file
-
boundary file
-
broach file
-
bubble-lattice file
-
carousel file
-
chained file
-
change file
-
circular file
-
coarse file
-
color-coded file
-
command file
-
compressor bar file
-
contiguous file
-
crossing file
-
data file
-
dead file
-
destination file
-
detail file
-
differential file
-
direct-access file
-
direct file
-
directory file
-
disk file
-
display file
-
double-cut file
-
double-faced file
-
drawing file
-
dustproof file
-
expanding file
-
external file
-
father file
-
fine cut file
-
flat file
-
float-cut file
-
float file
-
fork file
-
hand file
-
hierarchical file
-
high-security file
-
image file
-
inactive file
-
index file
-
indexed file
-
indirect file
-
input file
-
internal file
-
inverted file
-
journal file
-
knife file
-
lateral file
-
lever arch file
-
link file
-
locked file
-
logical file
-
machine file
-
magneto file
-
main file
-
many-reel file
-
master file
-
material file
-
mechanical card file
-
microfiche file
-
microfilm file
-
model file
-
multireel file
-
multivolume file
-
object file
-
open back file
-
output file
-
part file
-
permalloy bar file
-
pointed file
-
printout file
-
problem file
-
program file
-
random file
-
rasping file
-
rasp file
-
register file
-
relational file
-
relative file
-
remote file
-
robot description file
-
rotary file
-
round file
-
route file
-
safeguarded file
-
scratch file
-
sequential file
-
shareable file
-
smooth file
-
son file
-
source file
-
spool file
-
suspension file
-
swapping file
-
system data file
-
tape reel file
-
taper file
-
temporary file
-
text file
-
threaded file
-
tool file
-
tooling file
-
transaction file
-
triangular file
-
update file
-
user authorization file
-
vertical file
-
virtual file
-
visible file
-
volatile file
-
work file
См. также в других словарях:
Computer security model — A computer security model is a scheme for specifying and enforcing security policies. A security model may be founded upon a formal model of access rights, a model of computation, a model of distributed computing, or no particular theoretical… … Wikipedia
Lattice-based access control — In computer security, lattice based access control (LBAC) is a complex access control based on the interaction between any combination of objects (such as resources, computers, and applications) and subjects (such as individuals, groups or… … Wikipedia
Bell-LaPadula model — The Bell LaPadula Model is a state machine model used for enforcing access control in government and military applications. [cite book|last=Hansche|first=Susan|coauthors=John Berti, Chris Hare|title=Official (ISC)2 Guide to the CISSP… … Wikipedia
Bell–LaPadula model — The Bell LaPadula Model (abbreviated BLP) is a state machine model used for enforcing access control in government and military applications.[1] It was developed by David Elliott Bell and Leonard J. LaPadula, subsequent to strong guidance from… … Wikipedia
Binomial options pricing model — BOPM redirects here; for other uses see BOPM (disambiguation). In finance, the binomial options pricing model (BOPM) provides a generalizable numerical method for the valuation of options. The binomial model was first proposed by Cox, Ross and… … Wikipedia
Ring (computer security) — In computer science, hierarchical protection domains, [Paul A. Karger, Andrew J. Herbert, [http://doi.ieeecomputersociety.org/10.1109/SP.1984.10001 An Augmented Capability Architecture to Support Lattice Security and Traceability of Access] , sp … Wikipedia
Secure state — A secure state is Information System security term to describe where entities in an computer system are divided into subjects and objects, and it can be formally proven that each state transition preserves security by moving from one secure state … Wikipedia
Option (finance) — Stock option redirects here. For the employee incentive, see Employee stock option. Financial markets Public market Exchange Securities Bond market Fixed income … Wikipedia
Trusted system — In the security engineering subspecialty of computer science, a trusted system is a system that is relied upon to a specified extent to enforce a specified security policy. As such, a trusted system is one whose failure may break a specified… … Wikipedia
Access control — is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical… … Wikipedia
John von Neumann — Von Neumann redirects here. For other uses, see Von Neumann (disambiguation). The native form of this personal name is Neumann János. This article uses the Western name order. John von Neumann … Wikipedia