For all your dictionary needs!
Tip. You can look up words, expressions, names, titles...
Header of access control

Access control

Video footage: Access Control, Man Writing on Glass
Play/pauseBuy footageFind more

Definition of the noun Access control

What does Access control mean as a name of something?


  1. The practice of restricting entrance to a property, a building, or a room to authorized persons.
  2. In technology, permitting or denying the use of a particular resource.


Access control: In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.

  • also known as 存取控制

Printed dictionaries and other books with definitions for Access control

Click on a title to look inside that book (if available):

Google previewOperating Systems (2016)

by CTI Reviews

Access control is a system which enables an authority to control access to areas and resources in a given physical facility or computer-based information system. An access control system, within the field of physical security, is generally seen ...

Google previewAdvances in Information Technology Research and Application: 2013 Edition (2013)


operating mode ; storage circuit access control means arranged to enable said processor (103, ...

Google previewWireless Security Essentials (2002)

Defending Mobile Systems from Data Piracy by Russell Dean Vines

Mandatory Access Control Mandatory access control refers to the authorization of a subject to access an object; it is...

Discretionary Access Control Discretionary access control means that the subject has authority, within certain limitations, to specify which objects can be accessed.

Google previewData and Applications Security XX (2006)

20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings by Ernesto Damiani, Peng Liu

Role-based access control is an important way of limiting the access users have to computing resources.

Google previewAnalysis Techniques for Information Security (2010)

by Anupam Datta, Somesh Jha, Ninghui Li

Access control is a fundamental and pervasive security mechanism in use today. It controls which principals (users, processes, machines , etc.) ...

Google previewCounter Hack Reloaded, Step-by-Step Guide to Computer Attacks and Effective Defenses (2016)

by CTI Reviews

Access control is a system which enables an authority to control access to areas and resources in a given physical facility or computer-based information system. An access control system, within the field of physical security, is generally seen ...

Google previewAccess Control Systems (2005)

Security, Identity Management and Trust Models by Messaoud Benantar

Lattice-based access control is an essential aspect of computing security in environments requiring stringent information-flow controls. In lattice-based protection systems, information-flow policies bind system objects and subjects to security ...

Google previewConstructing Ambient Intelligence (2008)

AmI 2007 Workshops Darmstadt, Germany, November 7-10, 2007, Revised Papers by Max Mühlhäuser, Alois Ferscha, Erwin Aitenbichler

Introduction Using physical items to perform access control is a proven approach to enhance security. With the proliferation of the “Internet of Things” [3], billions of physical items with the ability to digitally carry identifying information will be ...

Google previewMCSA Windows Server 2012 R2 Complete Study Guide (2014)

Exams 70-410, 70-411, 70-412, and 70-417 by William Panek

Configure User and Device Claim Types Dynamic Access Control is a must-have for any corporate environment. DAC takes folder and file permissions to a whole new level by enabling more granular methods of access and authentication ...

Google previewMCSA Windows Server 2012 R2 Configuring Advanced Services Study Guide (2015)

Exam 70-412 by William Panek

Dynamic Access Control is a must- have for any corporate environment. DAC takes folder and file permissions to a whole new level by enabling more granular methods of access and authentication ...

Google previewComputational Science and Its Applications –- ICCSA 2009 (2009)

International Conference, Seoul, Korea, June 29--July 2, 2009, Proceedings by Osvaldo Gervasi, David Taniar, Beniamino Murgante, Antonio Laganà, Youngsong Mun

The first approach is Role Based Access Control (RBAC) mechanism where each user has to take a specific role. Role Based Access Control is a good way to manage privacy data ...

Google previewInformation and Communications Security (2001)

Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001. Proceedings by Tatsuaki Okamoto, Jianying Zhou

Secure group communication with hierarchical access control refers to a scenario where a group of members is divided into a number of subgroups located at different privilege levels and a high-level subgroup can receive and decrypt ...

Google previewInternet of Things and M2M Communications (2013)

by Fabrice Theoleyr, Ai-Chun Pang

Bayu Anggorojati, Parikshit Narendra Mahalle, Neeli Rashmi Prasad and Ramjee Prasad Abstract Access control is a critical functionality in Internet of Things (IoT), and it is particularly promising to make access control secure, efficient and ...

Google previewPolicies for Distributed Systems and Networks (2001)

International Workshop, POLICY 2001 Bristol, UK, January 29-31, 2001 Proceedings by Morris Sloman, Jorge Lobo, Emil C. Lupu

A crucial practical advantage of making services autonomous in such matters as access control is that they can be managed independently; this is vital in any wide-area application that comprises a federation of independent partners.

Google previewComputing Handbook, Third Edition (2014)

Computer Science and Software Engineering by Teofilo Gonzalez, Jorge Diaz-Herrera, Allen Tucker

Access control is a fundamental technology to achieve ...

Google previewSecure Data Management (2004)

VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings by Willem Jonker, Milan Petković

Introduction Access control is an important aspect of computer ...

Google previewHIMSS Dictionary of Healthcare Information Technology Terms, Acronyms and Organizations, Third Edition (2013)


Access control decision function venting access by those who are not authorized to have it; a process that determines which data elements can be read , written, or erased by certain users of a system. 2. The prevention of use of a resource by ...

Google previewDictionary of Health Information Technology and Security (2007)

ACCESS CONTROL (AC): Policy and procedures that allow or prevent computer, server, or network access; to triage files for read, write, and erase functionality; enable authorized use of a resource while preventing unauthorized use or use in ...

Google previewThe Information Security Dictionary (2006)

Defining the Terms that Define Security for E-Business, Internet, Information and Wireless Technology by Urs E. Gattiker

Access Control Matrix 3 Unauthorized Use describes the situation whereby a party uses a process or data for which one was not given authority to do. Nonetheless, the user may still have gain authorized access to the system while using a ...

Google previewElsevier's Dictionary of Information Security (2007)

by G. Manoilov, B. Radichkova

access control gate 31 access control gate а Тоr n der Zugriffskontrolle f porte f de controle d'acces r ворота f контролируемого доступа 32 access control hardware а Наrdwaref der Zugriffskontrolle f matériel т informatique de controle ...

Google previewLinux Dictionary

by Binh Nguyen

An access control system will evaluate the security levels of the subject and object in order to see if access is permitted. Example: A simple example is the case where you enter a username and password in order to log onto the computer.

Google previewThe Froehlich/Kent Encyclopedia of Telecommunications (1994)

Volume 9 - IEEE 802.3 and Ethernet Standards to Interrelationship of the SS7 Protocol Architecture and the OSI Reference Model and Protocols by Fritz E. Froehlich, Allen Kent

Based on the security model introduced in this article, network access controls, like local operating system access controls, can be viewed as different ways of implementing an access control matrix. The European Computer Manufacturers ...

Google previewEncyclopedia of Microcomputers (1994)

Volume 15 - Reporting on Parallel Software to SNOBOL by Allen Kent, James G. Williams

A model for logical access control is provided by a Reference Monitor, which intercepts all access attempts and allows...

There are two main forms of logical access control: mandatory access control, based on fixed rules, and discretionary ...

Google previewThe CPM Dictionary (2004)

The Single Source for Acronyms, Terms, and Abbreviations in Business Continuity, Security and Emergency Management by Paul Kirvan

Access Control: Access control ensures that resources are only granted to those users who are entitled to them by limiting access to the resources of a system only to authorized programs, processes, or other systems (in a network); may be an ...

Google previewDictionary of Acronyms and Technical Abbreviations (2012)

For Information and Communication Technologies and Related Areas by Jakob Vlietstra

Network Automatic Coder Report Narrative Application Control Operating System Acoustical Intelligence Access Control Points Advanced Circuits Program Advanced Computational Processor Allied Communications Procedures| Publication ...

Google previewDictionary of Information Science and Technology (2006)

by Khosrow-Pour, Mehdi

Access Control 1: Methods used to determine if requests to use a system, network, application, or resource should be granted or denied. ( Knight & Labruyere, 2005) 2: Restriction of access to some resource through the ...

Google previewCommunications Standard Dictionary (2012)

by Martin Weik

access control mechanism access control mechanism: A hardware, software, or firmware feature, operating...

access control message: A message that pertains to the control of access to a communications, computer, data ...

Google previewWebster's New World Hacker Dictionary (2006)

by Bernadette Schell, Clemens Martin

Access Control Policy (general term):Typically, system administrators at the top of organizational and governmental agencies ascertain which individuals or systems will be given access to information.The access control policy outlines the ...

Online dictionaries and encyclopedias with entries for Access control

Click on a label to prioritize search results according to that topic:

Photos about Access control

Click on an item to view that photo:

access control

If you need related images for an article or a report, you can download stock photos:
Small photo of Electronic door access control system machine with number password and finger ,Scan access control system to lock and unlock doors Hand Holding Key cardSmall photo of Door electronic access control system machineSmall photo of Door access control - young woman holding a key card to lock and unlock door.Small photo of Business, Technology, Internet and network concept. Young businessman working on a virtual screen of the future and sees the inscription: access controlSmall photo of electronic key and finger access control system to lock and unlock doorsSmall photo of electronic key and finger access control system to lock and unlock doorsSmall photo of Business, Technology, Internet and network concept. Business man working on the tablet of the future, select on the virtual display: Access control More...

Video language resources about Access control

Click on an item to play that video:

View more videos about Access Control List.

See also the pronunciation examples of Access control!

Share this page


Go to the usage examples of Access control to see it in context!

Privacy Policy | Cookies Policy
Keyword Tool | Romanian-English Dictionary