Перевод: со всех языков на арабский

с арабского на все языки

security+level

  • 1 Security Support Provider Interface

    "A common interface between transport-level applications, such as Microsoft Remote Procedure Call (RPC), and security support providers (SSPs), such as Windows Distributed Security. SSPI allows a transport application to call one of the SSPs to obtain an authenticated connection. These calls do not require extensive knowledge of the security protocol's details."

    English-Arabic terms dictionary > Security Support Provider Interface

  • 2 user-level security

    "When using user-level security in an Access database, a database administrator or an object's owner can grant individual users or groups of users specific permissions to tables, queries, forms, reports, and macros."

    English-Arabic terms dictionary > user-level security

  • 3 access level

    A security role setting that determines for a given object type at which levels within the organization hierarchy a user can act on that object type.

    English-Arabic terms dictionary > access level

  • 4 Protected Environment Authorization service

    A utility whose primary goal it is to maintain the security of protected content processing binaries and letting those binaries know the security of the kernel (whether it is safe to run protected content). It determines the kernel to be at a particular security level that the Protected Environment secure process can interpret.

    English-Arabic terms dictionary > Protected Environment Authorization service

  • 5 PEAUTH

    A utility whose primary goal it is to maintain the security of protected content processing binaries and letting those binaries know the security of the kernel (whether it is safe to run protected content). It determines the kernel to be at a particular security level that the Protected Environment secure process can interpret.

    English-Arabic terms dictionary > PEAUTH

  • 6 ar-sa مسؤولية حالية

    "An approach to public key cryptography based on properties of elliptic curves. The primary advantage of ECC is efficiency, which becomes important as devices get smaller and security requirements get more demanding. For example, ECC keys between 163 bits and 512 bits are one-sixth to one-thirtieth the size of equivalent security-level RSA keys. As key size increases the relative efficiency of ECC increases."

    English-Arabic terms dictionary > ar-sa مسؤولية حالية

  • 7 elliptic curve cryptography

    "An approach to public key cryptography based on properties of elliptic curves. The primary advantage of ECC is efficiency, which becomes important as devices get smaller and security requirements get more demanding. For example, ECC keys between 163 bits and 512 bits are one-sixth to one-thirtieth the size of equivalent security-level RSA keys. As key size increases the relative efficiency of ECC increases."

    English-Arabic terms dictionary > elliptic curve cryptography

  • 8 elevated trust

    "In Silverlight, a security level that gives out-of-browser applications greater access to the local system."

    English-Arabic terms dictionary > elevated trust

  • 9 transparency

    "A security model that helps developers write and deploy secure libraries and applications by isolating code depending on privilege. Level 1 transparency was introduced in the.NET Framework version 2.0. It enables developers to annotate code to declare which types and members can perform security elevations and other trusted actions (security-critical) and which cannot (security-transparent). Level 2 transparency, which was introduced in the.NET Framework 4, refines this model. It adds a third group of code, security-safe-critical code, which are types or members that access secure resources and can be safely used by partially-trusted code in the.NET Framework."

    English-Arabic terms dictionary > transparency

  • 10 SSPI

    "A common interface between transport-level applications, such as Microsoft Remote Procedure Call (RPC), and security support providers (SSPs), such as Windows Distributed Security. SSPI allows a transport application to call one of the SSPs to obtain an authenticated connection. These calls do not require extensive knowledge of the security protocol's details."

    English-Arabic terms dictionary > SSPI

  • 11 full trust

    "A code access security (CAS) state assigned to managed assemblies. The level of trust granted to an application or Web service affects its ability to use system resources while executing. Assemblies that have full trust can access any resource that is subject to operating system security, and all privileged operations are supported."

    English-Arabic terms dictionary > full trust

  • 12 ar-sa التحكم بالوصول

    "An entry in either a securable object's discretionary access control list (DACL) or an object's system access control list (SACL). In a DACL, the entry grants or denies permissions to a user or group. In a SACL, the entry specifies which security events to audit for a particular user or group or controls the Windows Integrity Level for the object."

    English-Arabic terms dictionary > ar-sa التحكم بالوصول

  • 13 access control entry

    "An entry in either a securable object's discretionary access control list (DACL) or an object's system access control list (SACL). In a DACL, the entry grants or denies permissions to a user or group. In a SACL, the entry specifies which security events to audit for a particular user or group or controls the Windows Integrity Level for the object."

    English-Arabic terms dictionary > access control entry

  • 14 ACE

    "An entry in either a securable object's discretionary access control list (DACL) or an object's system access control list (SACL). In a DACL, the entry grants or denies permissions to a user or group. In a SACL, the entry specifies which security events to audit for a particular user or group or controls the Windows Integrity Level for the object."

    English-Arabic terms dictionary > ACE

  • 15 Parent: Child Business Units

    A security access level that allows a user access to record types in the user's business unit and all business units subordinate to the user's business unit.
    الأصل: وحدات عمل تابعة

    English-Arabic terms dictionary > Parent: Child Business Units

  • 16 code signing

    The process of adding a digital signature to additions and updates made to source code and applications published on the Internet. Code signing is intended to provide a level of security and trust to Internet software distribution.

    English-Arabic terms dictionary > code signing

См. также в других словарях:

  • Security level management — (SLM) comprises a quality assurance system for electronic information security. The aim of SLM is to display the IT security status transparently across a company at any time, and to make IT security a measurable quantity. Transparency and… …   Wikipedia

  • Security Level Management — (SLM) ist ein Qualitätssicherungssystem für die elektronische Informationssicherheit. SLM hat zum Ziel, den IT Sicherheitsstatus jederzeit unternehmensweit transparent darzustellen und IT Sicherheit zu einer messbaren Größe zu machen. Transparenz …   Deutsch Wikipedia

  • security level — Some BBS programs will have different user levels, usually numbered, which allow different levels of access. For example, 0 might refer to an unregistered user, 10 a registered user, and 99 for the SysOp. Each would have different levels of… …   Dictionary of telecommunications

  • Security and safety features new to Windows Vista — There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.Beginning in early 2002 with Microsoft s announcement of their Trustworthy Computing… …   Wikipedia

  • security —    Operating system controls used by the network administrator to limit users access to approved areas.    The National Security Agency document called Trusted Computer System Evaluation Criteria (TCSEC) specifies security levels that vendors… …   Dictionary of networking

  • Security Assertion Markup Language — (SAML) is an XML based standard for exchanging authentication and authorization data between security domains, that is, between an identity provider (a producer of assertions) and a service provider (a consumer of assertions). SAML is a product… …   Wikipedia

  • Security policy — is a definition of what it means to be secure for a system, organization or other entity. For an organization, it addresses the constraints on behavior of its members as well as constraints imposed on adversaries by mechanisms such as doors,… …   Wikipedia

  • Security and Prosperity Partnership of North America — Location map: Member countries:  Canada …   Wikipedia

  • Security as a service — refers to the practice of delivering traditional security applications as an Internet based service, on demand, to consumers and businesses. It is an example of the everything as a service trend and shares many of the common characteristics,… …   Wikipedia

  • Security guard — Private factory guard Occupation Activity sectors Security Description A security guard (or security officer) is a person who is paid to protect pro …   Wikipedia

  • Security engineering — is a specialized field of engineering that focuses on the security aspects in the design of systems that need to be able to deal robustly with possible sources of disruption, ranging from natural disasters to malicious acts. It is similar to… …   Wikipedia

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»