two-access mechanism


two-access mechanism
dvigubosios kreipties mechanizmas statusas T sritis automatika atitikmenys: angl. two-access mechanism vok. Doppelzugriffsmechanismus, m rus. механизм двойного доступа, m pranc. mécanisme à deux accès, m

Automatikos terminų žodynas. – Vilnius: Technika. . 2004.

Look at other dictionaries:

  • Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in …   Wikipedia

  • Access Control Matrix — or Access Matrix is an abstract, formal computer protection and security model used in computer systems, that characterizes the rights of each subject with respect to every object in the system. It was first introduced by Butler W. Lampson in… …   Wikipedia

  • Two-phase locking — This article is about concurrency control. For commit consensus within a distributed transaction, see Two phase commit protocol. In databases and transaction processing two phase locking, (2PL) is a concurrency control method that guarantees… …   Wikipedia

  • Two-man rule — The two man rule is a control mechanism designed to achieve a high level of security for especially critical material or operations. Under this rule all access and actions requires the presence of two authorized people at all times. Contents 1… …   Wikipedia

  • Two phase locking — In databases and transaction processing, two phase locking, (2PL) is a concurrency control locking protocol, mechanism, that guarantees serializability. It is also the name of the resulting class (set) of transaction schedules. Using locks that… …   Wikipedia

  • Internet Message Access Protocol — IMAP redirects here. For the antipsychotic, see Fluspirilene. Internet protocol suite Application layer BGP …   Wikipedia

  • Mandatory access control — In computer security, mandatory access control (MAC) refers to a type of access control by which the operating system constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target.… …   Wikipedia

  • Microsoft Data Access Components — MDAC redirects here. For other uses, see MDAC (disambiguation). MDAC (Microsoft Data Access Components) Microsoft Corporation s MDAC provides a uniform framework for accessing a variety of data sources on their Windows platform. Developer(s)… …   Wikipedia

  • Multiple Access with Collision Avoidance for Wireless — (MACAW)[1] is a slotted Medium Access Control (MAC) protocol widely used in Ad hoc networks.[2] Furthermore, it is foundation of many other MAC protocols used in Wireless Sensor Networks (WSN).[2] The IEEE 802.11 RTS/CTS mechanism is adopted from …   Wikipedia

  • Lindemann mechanism — In chemical kinetics, the Lindemann mechanism, sometimes called the Lindemann Hinshelwood mechanism, is a schematic reaction mechanism. Frederick Lindemann discovered the concept in 1921 and Cyril Hinshelwood developed it. [ [http://www.chem.iitm …   Wikipedia