Especificación
de un conjunto de reglas representadas mediante entradas de control de acceso
basadas en diferentes campos o propiedades. [CCN-STIC-401:2007]
Lista de
entidades, junto con sus derechos de acceso, que están autorizadas para acceder
a un recurso (ISO-7498-2).
Es un
mecanismo de seguridad que implementan el modelo de control de accesos.
[Ribagorda:1997]
Lista de
entidades, con sus derechos de acceso, que están autorizadas a tener acceso a
un recurso. [ISO-7498-2:1989]
1. A list of permissions
associated with an object. The list specifies who or what is allowed to access
the object and what operations are allowed to be performed on the object.
2. A mechanism that
implements access control for a system resource by enumerating the system
entities that are permitted to access the resource and stating, either
implicitly or explicitly, the access modes granted to each entity.
[CNSSI_4009:2010]
(I) /information system/ A
mechanism that implements access control for a system resource by enumerating
the system entities that are permitted to access the resource and stating,
either implicitly or explicitly, the access modes granted to each entity.
(Compare: access control matrix, access list, access profile, capability list.)
[RFC4949:2007]
A list of entities, together
with their access rights, which are authorized to have access to a resource. [ISO-7498-2:1989]
An access control list (ACL)
is a table that tells a computer operating system which access rights each user
has to a particular system object, such as a file directory or individual file.
Each object has a security attribute that identifies its access control list.
The list has an entry for each system user with access privileges. The most
common privileges include the ability to read a file (or all the files in a
directory), to write to the file or files, and to execute the file (if it is an
executable file, or program). Microsoft Windows NT/2000, Novell's NetWare,
Digital's OpenVMS, and Unix-based systems are among the operating systems that
use access control lists. The list is implemented differently by each operating
system.
http://searchsoftwarequality.techtarget.com/glossary/
A mechanism that implements
access control for a system resource by listing the identities of the system
entities that are permitted to access the resource.
http://www.sans.org/security-resources/glossary-of-terms/
An access control list (ACL)
is a table that tells a computer operating system which access rights each user
has to a particular system object, such as a file directory or individual file.
Each object has a security attribute that identifies its access control list.
The list has an entry for each system user with access privileges. The most
common privileges include the ability to read a file (or all the files in a
directory), to write to the file or files, and to execute the file (if it is an
executable file, or program). Microsoft Windows NT/2000, Novell's NetWare,
Digital's OpenVMS, and UNIX-based systems are among the operating systems that
use access control lists. The list is implemented differently by each operating
system.
http://searchsoftwarequality.techtarget.com/
Liste des entités qui
sont autorisées à accéder à une ressource, avec leurs autorisations d'accès. [ISO-7498-2:1989]
Liste de contrôle
d'accès utilisée dans de nombreuses situations et qui définit quelles
ressources (utilisateurs, ordinateurs, etc.) peuvent accéder à quels services
(e-mail, Internet, etc.).
http://www.cases.public.lu/functions/glossaire/