Overview

access control


Show Summary Details

Quick Reference

A trusted process that limits access to the resources and objects of a computer system in accordance with a security model. The process can be implemented by reference to a stored table that lists the access rights of subjects to objects, e.g. users to records. Optionally the process may record in an audit trail any illegal access attempts.

Subjects: Computing.


Reference entries

Users without a subscription are not able to see the full content. Please, subscribe or login to access all content.