A list that defines the privileges granted to each user.
A set of access control entry (ACE) strings that collectively provide access control for calendars, calendar properties, and calendar components such as events and todos (tasks). An example of an ACL with three ACEs, with each ACE separated by a semi-colon is @@o^a^r^g;@@o^c^wdeic^g;@^a^sf^g.
AC List of files and directories. More.
Rules associated with a directory that defines the permissions that users, groups, processes, and devices have for accessing data stored in the directory.
A security feature that determines the tasks each user, server, or group of users or servers in a Lotus Notes database can perform. Not to be confused with permission. Back to top of glossary
The property of an object that lists all the trustees of that object.
The Approved Carriage List
a list of access control elements that define access control to a particular resource
Extension of the conventional permission concept for files and directories. These allow a more fine-grained control of the access permissions.
Acceleration Control Lever@ƒAƒNƒZƒ‹EƒRƒ“ƒgƒ[ƒ‹EƒŒƒo[BHIGH-MACS‚Ì‘€c“ü—Í‘•'u‚̈ê‚‚ŋ@‘̂̉ÁŒ¸‘¬E”òsŽž‚Ì„—Í‚ðƒRƒ“ƒgƒ[ƒ‹‚·‚éB
access control list. In computer security, a list with an object that identifies all the subjects that can access the object and their access rights. For example, an access control list is a list that is associated with a file that identifies the users who can access the file and identifies the users' access rights to that file.
access control list. Contains entries that identify which groups or users have access to a particular object, including the type and scope of that access.
access control list. A list of users that have been granted or denied access to a resource. Used to control access to services and folders.
access control list. A mechanism for determining the access level and permissions that a given computing resource, such as a file or database field, provides for a given identity.
access control list. A file that contains information indicating who can and cannot access particular objects in the data directory. Purveyor creates a separate ACL file for each restricted object, and these files determine whether users and groups can access objects on a global, virtual path, browse, or file level.
Access Control List. List of users who may access a feature.
Access Control List. A list that contains information about an object describing which other objects can access it. It is a property of every object in the NetWare® Directory Services™ database. Trustees and the Inherited Rights Filter are contained in the ACL.
access control list. The mechanism for controlling access to your directory. In Sun ONE Directory Server, an ACL is an aci attribute in a directory entry.
Access Control List. The access control list for an object contains a list of all objects that are trustees of that object. Wannabe hackers think they can hack networks by copying password files to their floppy disks. The fact that security is passed through ACLs is the reason why this doesn't work. (Hello Martin R. if you are reading!)
Access Control List. A listing of Access Control Entries specifying access rights to services and specified data files located within Windows NT File System (NTFS) directories.
Access Control List - those users with permission to get at a resource.
access control list. One rudimentary security mechanism is the ACL in which the enforcer has a list of the physical (hardware) addresses of the devices (usually computers) permitted to access a network. These addresses are stored in MAC format. Drawbacks of this mechanism are that it's less useful to authenticate a hardware device than a user, and that MAC addresses can be spoofed by imposters. The advantage is that it's simple and easily administered.
Access Control List. A list of MAC addresses that restricts client to access point associations.
Access control list. Identifies the users who may access a resource, and the type of access to that resource, that a user is permitted to have. Once a user is authenticated the ACL controls what they are permitted to do.
Access control list. Netscape's mechanism for controlling access to your directory.
Access control list. A list of user ID's and the specific access permission for specific files on the system.
An access control list (ACL) is a table that tells a computer operating system which access rights each user has to a particular system object, such as a file directory or individual file. Each object has a security attribute that identifies its access control list. The list has an entry for each system user with access privileges. The most common privileges include the ability to read a file (or all the files in a directory), to write to the file or files, and to execute the file (if it is an executable file, or program).
Access Control List. The data set that contains the access rights each user has to a directory or file.
Access Control List - term used to describe the filter table commonly used in many routers to provide basic packet filtering capability.
Access Control List. Defines the roles that are required to execute a method. Defines the user or group IDs of people who do (or do not) have explicit access to a file or directory.
Access Control List, a list of users or groups and their specified permission s. See component ACL, general ACL.
Access Control List. A sequential list of permit and deny conditions. The list defines the connections permitted to pass through a device, usually a router. ACLâ€(tm)s act as a basic method of limiting access to the network.
access control list. (1.) A file attribute that contains the basic and extended permissions that control access to the file. (2.) A list of hosts (maintained by Enhanced X-Windows) that have access to client programs. By default, only programs on the local host and those in this list, also known as "access list," can use the display. The list can be changed by clients on the local host; some server implementations can also modify the list. The authorization protocol name and data received by the server at connection setup may affect the list as well.
Access Control List. Most network security systems operate by allowing selective use ofservices. An Access Control List is the usual means by whichaccess to, and denial of, services is controlled. It is simply alist of the services available, each with a list of the hostspermitted to use the service. ACK
access control list. A protection mechanism using a more refined level of protection than that available with UIC-based protection. ACLs can be used to grant or deny access to individual users or groups of users.
access control list (DFS term)
Access Control List, a list of users or groups and their specified permissions. See component ACL and general ACL.
Access Control List, meta-data that describes which users are allowed access to file data and what type of access is granted to that data. ACLs define access rights. In this scheme, users typically belong to "groups," and groups are given access rights as a whole. Typical types of access rights are read (list), write (modify), or create (insert). Different file systems have varying levels of ACL support and different file systems define different access rights. For example, DOS has only one set of rights for a file (since only one user is considered to use a DOS system). A POSIX 6-compliant file system allows multiple rights to be assigned to multiple files and directories for multiple users and multiple groups of users.
Access Control List. advertisers The operating system file that gives users access to files and programs they have no good reason to access
An authorization mechanism that controls application access to shared resources. Each access control list is a set of principal identities and/or security groups, with an associated set of permissions for each entry.
Access control list. Limits and controls who uses a host system or applications through communications link
n. Short for Access Control List.
Access Control List. A structure that enables administrators to set permissions beyond the standard UNIX permissions. An ACL enables administrators to set permissions for several individual users and/or groups. at A list of programs (jobs) entered into the system that need to be run only once.
An abbreviation for Access Control List.
access control list. A collection of access control entries that define a hierarchy of access rules to be evaluated when a server receives a request for access to a particular resource. See access control entry (ACE).
access control list. A list of group codes that a LAT service node includes in a service announcement to designate the LAT users permitted to use the service.
Access Control List -a listing of users and their associated access rights. Rules typically for routers, servers or security gateways, that determine which packets of information to pass and which to block.
access control list. A list kept by routers to control access to or from the router for a number of services (for example, to prevent packets with a certain IP address from leaving a particular interface on the router).
Access Control List. Most network security systems operate by allowing selective use of services. An Access Control List is the usual means by which access to, and denial of, services is controlled. It is simply a list of the services available, each with a list of the hosts permitted to use the service.
Access Control List. A list associated with an AFS directory that specifies what actions a user or group can perform on the directory and the files in it. There are seven access permissions: ( administer), ( delete), ( insert), ( lock), ( lookup), ( read), and ( write).
Access Control List; a mechanism to restrict access to data stored in an X.500 Directory Service.
Access Control List. Usually a list of devices that are allowed access to a network or network resource. This is sometimes known as MAC address filtering.
access control list. List of access control entries (ACEs) that grant or deny access to a particular system object.
access control list. DHCP mechanism whereby the server can allow or disallow the request or action defined in a packet. See also transaction signature (TSIG).
Access Control List. A collection of ACEs. An ACL is a mechanism for defining which users have access to your server. You can define ACL rules that are specific to a particular file or directory, granting or denying access to one or more users and groups.
access control list. access control list (ACL) - In Windows-based systems, a list of access control entries that apply to an entire object, a set of the objects properties, or an individual property of an object, and that define the access granted to one or more security principals.
The access control list (ACL) is a set of data associated with a resource that defines the permissions that users and groups have for accessing it.
access control list. a list that specifies what access privileges users have to a directory, specifically, the right to lookup, insert, delete, read, write, lock, or administer files in a directory (abbreviated as l, i, d, r, w, k, a, respectively).
Access Control List. An access control list (ACL) provides finer-grained file security than traditional UNIX file protection provides. For example, an ACL enables you to allow group read access to a file, while allowing only one member of that group to write to the file.
Access Control List. A level of Windows NT permission that you can set on a file or a folder allowing some users to access it while other users cannot access it. For details, see the Windows NT documentation. Boolean A type of variable that can have only two values, typically 1 or 0. Boolean variables are often used to express conditions that are either TRUE or FALSE. Queries with Boolean operators ( AND, OR, NOT, and NEAR) are referred to as Boolean queries.
access control list. The information that identifies specific users or groups and their access privileges for a particular file or directory.
Access control list A list of authorised users, processes or systems. See access control. Access network The local cables which connect individual telephone users to the main network. ActiveX Technology developed by Microsoft, similar to a plug-in, which is most commonly used to add functionality to the internet explorer web browser. Once installed, an ActiveX program, called a control, becomes a permanent part of the machine's operating system and has unrestricted access to local machine resources. Address spoofing A type of attack in which the attacker impersonates a legitimate system by stealing its network address.
Access Control List. The group of access directives that you define. The directives grant levels of access to specific data for specific clients and/or groups of clients.
Access Control List An indication of what actions (aclPrivileges) may be performed by a given party (aclTarget) on behalf of another party (aclSubject) within a given context (aclResources).
Access Control List. Part of Windows NT’s security description that controls access to a Windows NT object, such as a file. The owner of an object can change access control entities in the list to grant or revoke permissions (access rights) for the object.
access control list. Contains a list of users or groups and their security permissions. Identifies who can update, modify, or delete an object on a computer or resource on the network.
An access control list represents the rule set for controlling access to devices, resources or networks.
Access Control List. A list of privileges associated with every directory and file that specifies the type of access allowed for any user. Refer to the Data General Command Line Interpreter (CLI) User's Manual.
Access Control List. Used on router, they allow to limit network traffic, to control traffic flow, to secure access, to filter access type transferred or stopped on interfaces.
Access control list. A collection of ACEs that define the access rights to an NT object.
Access Control List. Database that describes the type of access each user has to a service.
access control list. A list of access control entries that determines which principals have access to a given resource or resources.
Access Control List. A list that specifies the rules for access to a particular resource.
Access Control List. A mechanism that implements access control for a system resource by listing the identities of the system entities that are permitted to access the resource.
access control list. In computer security, a collection of all access rights for one object. In computer security, a list associated with an object that identifies all the subjects that can access the object and their access rights; for example, a list associated with a file that identifies users who can access the file and identifies their access rights to that file.
Access Control List. A list that defines who has permission to access certain services; that is, for whom a server may perform certain tasks. This is usually a list of principals with the type of access assigned to each.
Access control list. A table that describes the access rights each user has to particular system objects, such as files and directories.
Access Control List. A file containing a list of principals with certain access permissions. Typically, a server consults an access control list to verify that a client has permission to use its services. Note that a principal authenticated by GSS-API can still be denied services if an ACL does not permit them.
Access control list. The usual means by which access to and denial of network services is controlled by network security systems. It is a list of the available services and the hosts permitted to use each service.
Access Control List. A list of user accounts and user groups and their privileges that is associated with a particular resource.
( Access Control List) A method of keeping in check the Internet traffic that attempts to flow through a given hub, router, firewall, or similar device. Access control is often accomplished by creating a list specifying the IP addresses and/or ports from which permitted traffic can come. The device stops any traffic coming from IP addresses or ports not on the ACL.