Computer access control
In computer security, general access control includes identification, authorization, authentication, access approval, and audit. A more narrow definition of access control would cover only access approval, whereby the system makes a decision to grant or reject an access request from an already authenticated subject, based on what the subject is authorized to access. Authentication and access control are often combined into a single operation, so that access is approved based on successful authentication, or based on an anonymous access token. Authentication methods and tokens include passwords, biometric scans, physical keys, electronic keys and devices, hidden paths, social barriers, and monitoring by humans and automated systems.
Link from a Wikipage to another Wikipage
primaryTopic
Computer access control
In computer security, general access control includes identification, authorization, authentication, access approval, and audit. A more narrow definition of access control would cover only access approval, whereby the system makes a decision to grant or reject an access request from an already authenticated subject, based on what the subject is authorized to access. Authentication and access control are often combined into a single operation, so that access is approved based on successful authentication, or based on an anonymous access token. Authentication methods and tokens include passwords, biometric scans, physical keys, electronic keys and devices, hidden paths, social barriers, and monitoring by humans and automated systems.
has abstract
In computer security, general ...... humans and automated systems.
@en
Wikipage page ID
41,263,993
page length (characters) of wiki page
Wikipage revision ID
1,013,860,565
Link from a Wikipage to another Wikipage
wikiPageUsesTemplate
subject
type
comment
In computer security, general ...... humans and automated systems.
@en
label
Computer access control
@en