access control list


Also found in: Dictionary, Medical, Acronyms, Wikipedia.

Access Control List

(networking)
(ACL) A list of the services available on a server, each with a list of the hosts permitted to use the service.

access control list

A set of data associated with a file, directory or other network resource that defines the permissions that users, groups, processes or devices have for accessing it. See access control and wildcard mask.
References in periodicals archive ?
new theory of interpretation of the CFAA, based on access control lists,
An access control object a contains a tabulation of privileges granted to various subjects -- an access control list. The function A(s, e, a) which describes all the access control lists in a library is partial, i.e., values are undefined for some subjects in some access control lists.
In addition, the two applications can share a common Access Control List (ACL) showing which access points (APs) are officially part of the customers' network.
Like any network gateway point, the AP must be properly secured to minimize the vulnerabilities to which it exposes the rest of the enterprise network For example, APs require the same multilayered protection as an Internet gateway; they should be physically secured, and only administrator-addressable from the wired side of the network In addition, APs should be protected by an access control list, firewall, and intrusion detection system that is constantly monitored.
Andrew [10] uses the access control list for service protection.
- IPv4/v6 Access Control List (ACL): Packet filtering limits network traffic and restrict network use by certain users or devices.
The distribution units contain a process definition for the business process and a partnering access control list (ACL), a unique feature that allows companies to specify which trading partners and individuals can monitor the execution of their business processes.
Tighter security -- A refined security infrastructure allows for a finer-grained control of the access control list of any document, including Windows or Unix files, Lotus Notes items, database entries and even HTML pages.
With Texar's s-Peer, all shared resources are protected by a policy-based access control list. Users can explicitly designate who is permitted to view and download the resources being shared.
Advanced Cyber Security - DHCP Snooping, IP Source Guard, Dynamic ARP Inspection, L2/L3/L4 Access Control List (ACL)
Advanced security and traffic control features include access control list, RADIUS and SSH support, as well as 4-queue QoS and private VLAN support, TACACS+, and IEEE 802.1w and 802.1s.
Hunan, China, August 03, 2017 --(PR.com)-- The JetWave 3220 is an EN50121-4 Industrial Dual 802.11n 2.4G/5G 2T2R MIMO Wireless AP/Bridge which features 802.11n 2T2R MIMO doubles data rate up to 300Mbps per radio; The JetNet 5428G is an Industrial 24+4G Gigabit Managed Ethernet Switch which supports Advanced Cyber Security functions such as DHCP Snooping, IP Source Guard, Dynamic ARP Inspection, Denial of Service (DoS) protection, and L2/L3/L4 Access Control List (ACL); The JetNet 3008 is an Industrial 8-port Fast Ethernet Switch which features 2.0Gbps Switch Fabric with excellent data exchange performance.

Full browser ?