access control A trusted process that limits access to the resources and objects of a computer system in accordance with a security model. The process can be implemented by reference to a stored table that lists the access rights of subjects to objects, e.g. users to records. Optionally the process may record in an audit trail any illegal access attempts.
More From encyclopedia.com
Access , ac·cess / ˈakˌses/ • n. 1. a means of approaching or entering a place: the staircase gives access to the top floor. ∎ the right or opportunity to use… random access , random access 1. A type of memory access in which storage locations can be accessed in any order. The term is applied primarily to the main memory of… ISAM Acronym for indexed sequential access method. , ISAM Acronym for indexed sequential access method. An access method for data files, supporting both sequential access and indexed access (see indexed… bookmark , bookmark •arc, ark, Bach, bark, barque, Braque, Clark, clerk, dark, embark, hark, impark, Iraq, Ladakh, Lamarck, lark, macaque, marc, mark, marque, n… Gatekeeping , gatekeeping The hierarchical structure of formal organizations places certain individuals or groups in crucial positions from which they can control… Authentication , Authentication is the process of verifying the identity of something or someone, often for security purposes, through some unique characteristic. Alt…
About this article
Updated About encyclopedia.com content Print Article
You Might Also Like