For all your dictionary needs!
Tip. You can look up words, expressions, names, titles...
Header of access control

Access control

Video footage: Reader of access control
Play/pauseBuy footageFind more

Definition of the noun Access control

What does Access control mean as a name of something?


  1. The practice of restricting entrance to a property, a building, or a room to authorized persons.
  2. In technology, permitting or denying the use of a particular resource.


Access control: In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.

  • also known as 存取控制

Printed dictionaries and other books with definitions for Access control

Click on a title to look inside that book (if available):

Google previewAdvances in Information Technology Research and Application: 2013 Edition (2013)


operating mode ; storage circuit access control means arranged to enable said processor (103, ...

Google previewData and Applications Security XX (2006)

20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings by Ernesto Damiani, Peng Liu

Role-based access control is an important way of limiting the access users have to computing resources.

Google previewAnalysis Techniques for Information Security (2010)

by Anupam Datta, Somesh Jha, Ninghui Li

Access control is a fundamental and pervasive security mechanism in use today. It controls which principals (users, processes, machines , etc.) ...

Google previewe-Study Guide for: Counter Hack Reloaded: Step-by-Step Guide to Computer Attacks and Effective Defenses by Edward Skoudis, ISBN 9780131481046 (2012)

by Cram101 Textbook Reviews

Access control is a system which enables an authority to control access to areas and resources in a given physical facility or computer-based information system. An access control system, within the field of physical security, is generally seen ...

Google previewAccess Control Systems (2005)

Security, Identity Management and Trust Models by Messaoud Benantar

Lattice-based access control is an essential aspect of computing security in environments requiring stringent information-flow controls. In lattice-based protection systems, information-flow policies bind system objects and subjects to security ...

Google previewConstructing Ambient Intelligence (2008)

AmI 2007 Workshops Darmstadt, Germany, November 7-10, 2007, Revised Papers by Max Mühlhäuser, Alois Ferscha, Erwin Aitenbichler

Introduction Using physical items to perform access control is a proven approach to enhance security. With the proliferation of the “Internet of Things” [3], billions of physical items with the ability to digitally carry identifying information will be ...

Google previewCompTIA Security+ Study Guide (2014)

SY0-401 by Emmett Dulaney, Chuck Easttom

Access control is a critical part of physical security, and ...

Google previewMCSA Windows Server 2012 R2 Configuring Advanced Services Study Guide (2015)

Exam 70-412 by William Panek

Dynamic Access Control is a must- have for any corporate environment. DAC takes folder and file permissions to a whole new level by enabling more granular methods of access and authentication ...

Google previewComputational Science and Its Applications –- ICCSA 2009 (2009)

International Conference, Seoul, Korea, June 29--July 2, 2009, Proceedings by Osvaldo Gervasi, David Taniar, Beniamino Murgante, Antonio Laganà, Youngsong Mun

The first approach is Role Based Access Control (RBAC) mechanism where each user has to take a specific role. Role Based Access Control is a good way to manage privacy data ...

Google previewInformation and Communications Security (2001)

Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001. Proceedings by Tatsuaki Okamoto, Jianying Zhou

Secure group communication with hierarchical access control refers to a scenario where a group of members is divided into a number of subgroups located at different privilege levels and a high-level subgroup can receive and decrypt ...

Google previewInternet of Things and M2M Communications (2013)

by Fabrice Theoleyr, Ai-Chun Pang

Bayu Anggorojati, Parikshit Narendra Mahalle, Neeli Rashmi Prasad and Ramjee Prasad Abstract Access control is a critical functionality in Internet of Things (IoT), and it is particularly promising to make access control secure, efficient and ...

Google previewPolicies for Distributed Systems and Networks (2001)

International Workshop, POLICY 2001 Bristol, UK, January 29-31, 2001 Proceedings by Morris Sloman, Jorge Lobo, Emil C. Lupu

A crucial practical advantage of making services autonomous in such matters as access control is that they can be managed independently; this is vital in any wide-area application that comprises a federation of independent partners.

Google previewComputing Handbook, Third Edition (2014)

Computer Science and Software Engineering by Teofilo Gonzalez, Jorge Diaz-Herrera, Allen Tucker

Access control is a fundamental technology to achieve ...

Google previewEffective Physical Security (2012)

by Lawrence J. Fennelly

Access control refers to the process of managing databases or other records; determining the parameters of authorized entry, such as whom or what will be granted access; when they may enter; and where access will occur. Access controls ...

Google previewSecure Data Management (2004)

VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings by Willem Jonker, Milan Petković

Introduction Access control is an important aspect of computer ...

Google previewHIMSS Dictionary of Healthcare Information Technology Terms, Acronyms and Organizations, Third Edition (2013)


Access control decision function venting access by those who are not authorized to have it; a process that determines which data elements can be read , written, or erased by certain users of a system. 2. The prevention of use of a resource by ...

Google previewDictionary of Health Information Technology and Security (2007)

ACCESS CONTROL (AC): Policy and procedures that allow or prevent computer, server, or network access; to triage files for read, write, and erase functionality; enable authorized use of a resource while preventing unauthorized use or use in ...

Google previewElsevier's Dictionary of Information Security (2007)

by G. Manoilov, B. Radichkova

access control gate 31 access control gate а Тоr n der Zugriffskontrolle f porte f de controle d'acces r ворота f контролируемого доступа 32 access control hardware а Наrdwaref der Zugriffskontrolle f matériel т informatique de controle ...

Google previewLinux Dictionary

by Binh Nguyen

An access control system will evaluate the security levels of the subject and object in order to see if access is permitted. Example: A simple example is the case where you enter a username and password in order to log onto the computer.

Google previewThe Froehlich/Kent Encyclopedia of Telecommunications (1999)

Volume 18 - Wireless Multiple Access Adaptive Communications Technique to Zworykin: Vladimir Kosma by Fritz E. Froehlich, Allen Kent

1 Media Access Control (MAC) layer functional structure ( DCF = distributed coordination function; PCF = point coordination function). provided the channel is still idle. If the channel is sensed busy (another station has taken ...

Google previewEncyclopedia of Microcomputers (1994)

Volume 15 - Reporting on Parallel Software to SNOBOL by Allen Kent, James G. Williams

A model for logical access control is provided by a Reference Monitor, which intercepts all access attempts and allows...

There are two main forms of logical access control: mandatory access control, based on fixed rules, and discretionary ...

Google previewThe CPM Dictionary (2004)

The Single Source for Acronyms, Terms, and Abbreviations in Business Continuity, Security and Emergency Management by Paul Kirvan

Access Control: Access control ensures that resources are only granted to those users who are entitled to them by limiting access to the resources of a system only to authorized programs, processes, or other systems (in a network); may be an ...

Google previewCommunications Standard Dictionary (2012)

by Martin Weik

access control mechanism access control mechanism: A hardware, software, or firmware feature, operating...

access control message: A message that pertains to the control of access to a communications, computer, data ...

Google previewWebster's New World Hacker Dictionary (2006)

by Bernadette Schell, Clemens Martin

Access Control Policy (general term):Typically, system administrators at the top of organizational and governmental agencies ascertain which individuals or systems will be given access to information.The access control policy outlines the ...

Google previewEncyclopedia of Victimology and Crime Prevention (2010)

by Bonnie S. Fisher, Steven P. Lab

Natural Access Control and Target Hardening Going hand in hand with territorial reinforcement is the next CPTED principle: natural access control. Similar to territoriality, this principle focuses on the strategy of blocking off access to crime ...

Google previewThe Information Security Dictionary (2006)

Defining the Terms that Define Security for E-Business, Internet, Information and Wireless Technology by Urs E. Gattiker

Access Control Matrix 3 Unauthorized Use describes the situation whereby a party uses a process or data for which one was not given authority to do. Nonetheless, the user may still have gain authorized access to the system while using a ...

Google previewEncyclopedia of Information Ethics and Security (2007)

by Quigley, Marian

In this article we first introduce the basic concept of Health Level Seven and role- based access control. Then we...

Google previewDictionary of Computer Science, Engineering and Technology (2000)

by Philip A. Laplante

access control a means of allowing access to an object based on the type of access sought, the accessor's privileges, and the owner's policy. access control list a list of items associated with a file or other object; ...

Online dictionaries and encyclopedias with entries for Access control

Click on a label to prioritize search results according to that topic:

Photos about Access control

Click on an item to view that photo:

access control

If you need related images for an article or a report, you can download stock photos:
Small photo of electronic key and finger access control system to lock and unlock doorsSmall photo of electronic key and finger access control system to lock and unlock doorsSmall photo of fingerprint and access control in a office buildingSmall photo of Electronic access control system closeupSmall photo of Door access control with a hand inserting key card to lock and unlock door. Security concept.Small photo of Access Control - Isolated female hand touching or pointing to button. Business and future technology concept. Stock PhotoSmall photo of Door access control with a hand inserting key card to lock and unlock door. Security system concept. More...

Video language resources about Access control

Click on an item to play that video:

View more videos about Access Control List.

See also the pronunciation examples of Access control!

Share this page


Go to the usage examples of Access control to see it in context!

Privacy Policy | Cookies Policy
Keyword Tool | Romanian-English Dictionary