-
1 безопасность на основе интеллектуальных жетонов
Security: smart token security, token-based securityУниверсальный русско-английский словарь > безопасность на основе интеллектуальных жетонов
-
2 безопасность на основе интеллектуальных карточек
Security: smart token security, token-based securityУниверсальный русско-английский словарь > безопасность на основе интеллектуальных карточек
См. также в других словарях:
Capability-based security — is a concept in the design of secure computing systems. A capability (known in some systems as a key) is a communicable, unforgeable token of authority. It refers to a value that references an object along with an associated set of access rights … Wikipedia
Security token — Several types of security tokens with a penny for scale … Wikipedia
Security Identifier — In the context of the Microsoft Windows NT line of operating systems, a Security Identifier (commonly abbreviated SID) is a unique name (an alphanumeric character string) which is assigned by a Windows Domain controller during the log on process… … Wikipedia
Security Assertion Markup Language — (SAML) is an XML based standard for exchanging authentication and authorization data between security domains, that is, between an identity provider (a producer of assertions) and a service provider (a consumer of assertions). SAML is a product… … Wikipedia
security — se·cur·i·ty /si kyu̇r ə tē/ n pl ties 1 a: something (as a mortgage or collateral) that is provided to make certain the fulfillment of an obligation used his property as security for a loan b: surety see also … Law dictionary
Security First Network Bank — claimed to be the first pure internet bank and was founded in October 1995 based in Pineville, Kentucky [ [http://www.fdic.gov/bank/analytical/banking/1995summ/art3full.html FDIC Banking Review, Vol. 8 No. 3 Article III February, 1996] ] .… … Wikipedia
Security and safety features new to Windows Vista — There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.Beginning in early 2002 with Microsoft s announcement of their Trustworthy Computing… … Wikipedia
Data security — is the means of ensuring that data is kept safe from corruption and that access to it is suitably controlled. Thus data security helps to ensure privacy. It also helps in protecting personal data. Data security is part of the larger practice of… … Wikipedia
Claims-based identity — is a common way for applications to acquire the identity information they need about users inside their organization, in other organizations, and on the Internet.[1] It also provides a consistent approach for applications running on premises or… … Wikipedia
Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… … Wikipedia
RSA Security — Infobox Company company name = RSA, The Security Division of EMC company company type = Division (organization) of EMC Corporation company slogan = ? foundation = 1986 location = Bedford, Massachusetts key people = Arthur W. Coviello, Jr.,… … Wikipedia