- secure access
- безопасный доступ; защищённый доступ
English-Russian dictionary of computer science and programming. 2013.
English-Russian dictionary of computer science and programming. 2013.
Secure Access Module — A Secure Access Module is a hardware module used in electronic equipment for the purposes of cryptography, and is often used in ATMs. It contains a secret crypting algorithm … Wikipedia
Secure Access Module — Ein Secure Access Module (SAM) ist ein Mikrokontroller in Chipkarten oder IC Bauform, der kryptographische Funktionen wie Schlüsselaustauschalgorithmen, Signaturfunktionen und Verschlüsselung beinhaltet und zum sicheren Transport und zur Lagerung … Deutsch Wikipedia
Secure Shell — or SSH is a network protocol that allows data to be exchanged using a secure channel between two networked devices. RFC 4252] Used primarily on Linux and Unix based systems to access shell accounts, SSH was designed as a replacement for TELNET… … Wikipedia
Secure communication — includes means by which people can share information with varying degrees of certainty that third parties cannot know what was said. Other than communication spoken face to face out of possibility of listening, it is probably safe to say that no… … Wikipedia
Access control — is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical… … Wikipedia
Secure messaging — is a server based approach to protect sensitive data when sent beyond the corporate borders and provides compliance with industry regulations such as HIPAA, GLBA and SOX. Advantages over classical secure e Mail are that confidential and… … Wikipedia
Secure multi-party computation — (also known as secure computation or multi party computation (MPC)) is a sub field of cryptography. The goal of methods for secure multi party computation is to enable parties to jointly compute a function over their inputs, while at the same… … Wikipedia
Secure by design — Secure by design, in software engineering, means that the software has been designed from the ground up to be secure. Malicious practices are taken for granted and care is taken to minimize impact when a security vulnerability is discovered. For… … Wikipedia
secure — [adj1] safe defended, guarded, immune, impregnable, out of harm’s way, protected, riskless, sheltered, shielded, unassailable, undamaged, unharmed; concept 587 Ant. endangered, insecure, unprotected, unsafe secure [adj2] fastened, stable adjusted … New thesaurus
Secure electronic transaction — (SET) is a standard protocol for securing credit card transactions over insecure networks, specifically, the Internet. SET is not itself a payment system, but rather a set of security protocols and formats that enables users to employ the… … Wikipedia
Secure Digital Music Initiative — (SDMI) was a forum formed in late 1998, composed of more than 200 IT, consumer electronics, security technology, ISP and recording industry companies, ostensibly with the purpose of developing technology specifications that protected the playing … Wikipedia