access-control mechanism

access-control mechanism

[¦ak‚ses kən′trōl ¦me·kə·ni·zəm]
(computer science)
McGraw-Hill Dictionary of Scientific & Technical Terms, 6E, Copyright © 2003 by The McGraw-Hill Companies, Inc.
References in periodicals archive ?
Selection of access-control mechanisms in femtocell has a deteriorating effect on network performance.
Others look at the increasing commodification of information by (not necessarily free) contractual means in digital environments and the dangers of information enclosure through technical measures such as copy-protection or access-control mechanisms. Chapters that are focused on intellectual property law examine, in turn, copyright law, database protection law, and patent law.
A detailed audit trail, disaster-recovery ready solutions, and granular Access-Control mechanisms help make Enterprise Password Vault the information security software selection for a number of large enterprise and compliance and regulation heavy organizations.
In addition, the Enterprise Password Vault Appliance features:multi-layer security; password policy enforcement; audit reports; access-control mechanisms; as well as change management, the company claims.
Based on preconfigured access-control mechanisms, such as wireless equivalency protocol (WEP), Wi-Fi protected access (WPA) or 802.11x, a given client may be allowed or denied access when it tries to associate.
These include security scanners, intrusion-detection systems, file system-integrity checkers, access-control mechanisms, virus scanners, application proxies, encryption utilities, secure remote administration tools, system-hardening scripts, and firewall tools.