expand for answer

Capability

A token used as an identifier for a resource such that possession of the token confers access rights for the resource.


Similar items:
Focuses on security and encryption to prevent unauthorized copying limit distribution to only those who pay. This is considered firstgeneration DRM. Secondgeneration DRM covers description, identification, trading, protection, monitoring and tracking of all forms of rights usages over both tangible and intangible assets including management of rights holders’ relationships. It is important to note that DRM manages all rights, not just those involving digital content. Additionally, it is important to note that DRM is the “digital management of rights” and not the “management of digital rights. ” That is, DRM manages all rights, not only the rights applicable to permissions over digital content.
[view]
A technology that uses electromagnetic or electrostatic coupling in the radio frequency (RF) portion of the electromagnetic spectrum to identify a specific device. Each RFID tag includes a unique identifier, so that when a nearby antenna/transceiver actives the tag, it transmits that identifier back to the antenna where that value is recorded or used to trigger some kind of action. For example, most modern toll-road systems use RFID devices that drivers attach to the windshield of their car, and each time a device is “read” by an antenna, the vehicle owner’s toll balance is incremented by the cost of that transit. RFID devices may also be used to track individuals (carrying tags), equipment (bearing tags), and so forth, within the premises of an enterprise for security monitoring.
[view]
A hierarchy of access modes through which a computer system enforces the access rights granted to each user, program, and process, ensuring that each operates only within its authorized access mode. One of a hierarchy of privileged modes of an information system that gives certain access rights to user programs and processes that are authorized to operate in a given mode.
[view]
A terminal that may be used by more than one class of users, for example, users with different access rights to data or files.
[view]
A combination of rights and permissions. Rights refer to actions a user can perform on a system such as changing the system time. Permissions refer to the level of access a user is granted to data such as read, write, modify, and delete.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in