Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Free
Faster access than browser!
 

Authorization

Index Authorization

Authorization is the function of specifying access rights/privileges to resources related to information security and computer security in general and to access control in particular. [1]

43 relations: Access control, Access control list, Application software, Atomic authorization, Authentication, Author, Authorization hold, Authorization Open Service Interface Definition, Bank, Capability-based security, Computer, Computer hardware, Computer network, Computer program, Computer security, Credit card, Data, Debit card, Human resources, Identity (social science), Information security, Internet Engineering Task Force, Kerberos (protocol), OpenID, OpenID Connect, Operating system, Policy, Principle of least privilege, Privilege escalation, Publishing, Security, Security engineering, Social control, Software, Stephen Hawking, System administrator, Token coin, Trusted system, Trusted third party, Usability of web authentication systems, WebFinger, WebID, XACML.

Access control

In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource.

New!!: Authorization and Access control · See more »

Access control list

An access control list (ACL), with respect to a computer file system, is a list of permissions attached to an object.

New!!: Authorization and Access control list · See more »

Application software

An application software (app or application for short) is a computer software designed to perform a group of coordinated functions, tasks, or activities for the benefit of the user.

New!!: Authorization and Application software · See more »

Atomic authorization

Atomic authorization is the act of securing authorization rights independently from the intermediary applications to which they are granted and the parties to which they apply.

New!!: Authorization and Atomic authorization · See more »

Authentication

Authentication (from authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity.

New!!: Authorization and Authentication · See more »

Author

An author is the creator or originator of any written work such as a book or play, and is thus also a writer.

New!!: Authorization and Author · See more »

Authorization hold

Authorization hold (also card authorization, preauthorization, or preauth) is the practice within the banking industry of verifying electronic transactions initiated with a debit card or credit card and rendering this balance as unavailable until either the merchant clears the transaction, also called settlement, or the hold "falls off." In the case of debit cards, authorization holds can fall off the account, thus rendering the balance available again, anywhere from one to eight business days after the transaction date, depending on the bank's policy.

New!!: Authorization and Authorization hold · See more »

Authorization Open Service Interface Definition

The Authorization Open Service Interface Definition (OSID) is an O.K.I. specification which provides the means to define who is authorized to do what, when.

New!!: Authorization and Authorization Open Service Interface Definition · See more »

Bank

A bank is a financial institution that accepts deposits from the public and creates credit.

New!!: Authorization and Bank · See more »

Capability-based security

Capability-based security is a concept in the design of secure computing systems, one of the existing security models.

New!!: Authorization and Capability-based security · See more »

Computer

A computer is a device that can be instructed to carry out sequences of arithmetic or logical operations automatically via computer programming.

New!!: Authorization and Computer · See more »

Computer hardware

Computer hardware includes the physical parts or components of a computer, such as the central processing unit, monitor, keyboard, computer data storage, graphic card, sound card and motherboard.

New!!: Authorization and Computer hardware · See more »

Computer network

A computer network, or data network, is a digital telecommunications network which allows nodes to share resources.

New!!: Authorization and Computer network · See more »

Computer program

A computer program is a collection of instructions for performing a specific task that is designed to solve a specific class of problems.

New!!: Authorization and Computer program · See more »

Computer security

Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.

New!!: Authorization and Computer security · See more »

Credit card

A credit card is a payment card issued to users (cardholders) to enable the cardholder to pay a merchant for goods and services based on the cardholder's promise to the card issuer to pay them for the amounts so paid plus the other agreed charges.

New!!: Authorization and Credit card · See more »

Data

Data is a set of values of qualitative or quantitative variables.

New!!: Authorization and Data · See more »

Debit card

A debit card (also known as a bank card, plastic card or check card) is a plastic payment card that can be used instead of cash when making purchases.

New!!: Authorization and Debit card · See more »

Human resources

Human resources are the people who make up the workforce of an organization, business sector, or economy.

New!!: Authorization and Human resources · See more »

Identity (social science)

In psychology, identity is the qualities, beliefs, personality, looks and/or expressions that make a person (self-identity) or group (particular social category or social group).

New!!: Authorization and Identity (social science) · See more »

Information security

Information security, sometimes shortened to InfoSec, is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.

New!!: Authorization and Information security · See more »

Internet Engineering Task Force

The Internet Engineering Task Force (IETF) develops and promotes voluntary Internet standards, in particular the standards that comprise the Internet protocol suite (TCP/IP).

New!!: Authorization and Internet Engineering Task Force · See more »

Kerberos (protocol)

Kerberos is a computer network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.

New!!: Authorization and Kerberos (protocol) · See more »

OpenID

OpenID is an open standard and decentralized authentication protocol.

New!!: Authorization and OpenID · See more »

OpenID Connect

OpenID Connect (OIDC) is an authentication layer on top of OAuth 2.0, an authorization framework.

New!!: Authorization and OpenID Connect · See more »

Operating system

An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs.

New!!: Authorization and Operating system · See more »

Policy

A policy is a deliberate system of principles to guide decisions and achieve rational outcomes.

New!!: Authorization and Policy · See more »

Principle of least privilege

In information security, computer science, and other fields, the principle of least privilege (PoLP, also known as the principle of minimal privilege or the principle of least authority) requires that in a particular abstraction layer of a computing environment, every module (such as a process, a user, or a program, depending on the subject) must be able to access only the information and resources that are necessary for its legitimate purpose.

New!!: Authorization and Principle of least privilege · See more »

Privilege escalation

Privilege escalation is the act of exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user.

New!!: Authorization and Privilege escalation · See more »

Publishing

Publishing is the dissemination of literature, music, or information—the activity of making information available to the general public.

New!!: Authorization and Publishing · See more »

Security

Security is freedom from, or resilience against, potential harm (or other unwanted coercive change) from external forces.

New!!: Authorization and Security · See more »

Security engineering

Security engineering is a specialized field of engineering that focuses on the security aspects in the design of systems that need to be able to deal robustly with possible sources of disruption, ranging from natural disasters to malicious acts.

New!!: Authorization and Security engineering · See more »

Social control

Social control is a concept within the disciplines of the social sciences.

New!!: Authorization and Social control · See more »

Software

Computer software, or simply software, is a generic term that refers to a collection of data or computer instructions that tell the computer how to work, in contrast to the physical hardware from which the system is built, that actually performs the work.

New!!: Authorization and Software · See more »

Stephen Hawking

Stephen William Hawking (8 January 1942 – 14 March 2018) was an English theoretical physicist, cosmologist, and author, who was director of research at the Centre for Theoretical Cosmology at the University of Cambridge at the time of his death.

New!!: Authorization and Stephen Hawking · See more »

System administrator

A system administrator, or sysadmin, is a person who is responsible for the upkeep, configuration, and reliable operation of computer systems; especially multi-user computers, such as servers.

New!!: Authorization and System administrator · See more »

Token coin

In the study of numismatics, token coins or trade tokens are coin-like objects used instead of coins.

New!!: Authorization and Token coin · See more »

Trusted system

In the security engineering subspecialty of computer science, a trusted system is a system that is relied upon to a specified extent to enforce a specified security policy.

New!!: Authorization and Trusted system · See more »

Trusted third party

In cryptography, a trusted third party (TTP) is an entity which facilitates interactions between two parties who both trust the third party; the Third Party reviews all critical transaction communications between the parties, based on the ease of creating fraudulent digital content.

New!!: Authorization and Trusted third party · See more »

Usability of web authentication systems

Usability of web authentication systems refers to the efficiency and user acceptance of online authentication systems.

New!!: Authorization and Usability of web authentication systems · See more »

WebFinger

WebFinger is a protocol specified by the Internet Engineering Task Force IETF that allows for discovery of information about people and things identified by a URI.

New!!: Authorization and WebFinger · See more »

WebID

WebID gives one way to log into an internet service.

New!!: Authorization and WebID · See more »

XACML

XACML stands for "eXtensible Access Control Markup Language".

New!!: Authorization and XACML · See more »

Redirects here:

AuthZ, Authorisation, Authorisation procedure, Authorise, Authorised, Authorization (computer access control), Authorization code, Authorization codes, Authorize, Authorized, Authz, Loan authorisation, Loan authorization, Unauthorised, Unauthorized.

References

[1] https://en.wikipedia.org/wiki/Authorization

OutgoingIncoming
Hey! We are on Facebook now! »