WORKPLACEwaysofcontrollingwho canenterabuildingorarea, usuallyinvolvingelectronictechnology:Thebuildingsaresecuredwith anaccesscontrolsystem.ITwaysofcontrollingwho canseeorenterinformationon acomputersystem:Weensurethatpropersecurityandaccesscontrolsare inplacetoprotectyourdata.(Definition ofaccess controlfrom theCambridge Business English Dictionary? Cambridge University Press)
Examplesofaccess control
access controlThis threat may be eliminated by physically separating theaccesscontrolnetwork from the network of the organization.FromWikipediaThis example is from Wikipedia and may be reused under a CC BY-SA license.Electronicaccesscontroluses computers to solve the limitations of mechanical locks and keys.FromWikipediaThis example is from Wikipedia and may be reused under a CC BY-SA license.When access is denied based on theaccesscontrollist, the door remains locked.FromWikipediaThis example is from Wikipedia and may be reused under a CC BY-SA license.It also offers multi-master replication,accesscontrol, and many extensions.FromWikipediaThis example is from Wikipedia and may be reused under a CC BY-SA license.Main research topics are information search andaccesscontrolin distributed smart spaces.FromWikipediaThis example is from Wikipedia and may be reused under a CC BY-SA license.This object request broker provides a standard-based communications protocol, handles the security andaccesscontrol, and provides deployment methods for the agents.FromWikipediaThis example is from Wikipedia and may be reused under a CC BY-SA license.Its main focuses are working onaccesscontrollists, event auditing, extended attributes, mandatory access controls, and fine-grained capabilities.FromWikipediaThis example is from Wikipedia and may be reused under a CC BY-SA license.Attributes can be compared to static values or to one another thus enabling relation-basedaccesscontrol.FromWikipediaThis example is from Wikipedia and may be reused under a CC BY-SA license.Mandatoryaccesscontrolschemes can also audit accesses, in order to determine if need to know has been violated.FromWikipediaThis example is from Wikipedia and may be reused under a CC BY-SA license.Accesscontrolalso uses authentication to verify the identity of consumers.FromWikipediaThis example is from Wikipedia and may be reused under a CC BY-SA license.These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.#https://dictionary.cambridge.org//dictionary/english/access-control##