authentication

(redirected from Access control)
Also found in: Thesaurus, Medical, Legal, Financial, Acronyms, Encyclopedia, Wikipedia.

au·then·ti·cate

 (ô-thĕn′tĭ-kāt′)
tr.v. au·then·ti·cat·ed, au·then·ti·cat·ing, au·then·ti·cates
To establish the authenticity of; prove genuine: a specialist who authenticated the antique samovar. See Synonyms at confirm.

au·then′ti·ca′tion n.
au·then′ti·ca′tor n.

authentication

1. A security measure designed to protect a communications system against acceptance of a fraudulent transmission or simulation by establishing the validity of a transmission, message, or originator.
2. A means of identifying individuals and verifying their eligibility to receive specific categories of information.
3. Evidence by proper signature or seal that a document is genuine and official.
4. In evasion and recovery operations, the process whereby the identity of an evader is confirmed. See also evader; evasion; evasion and recovery; recovery operations; security.
ThesaurusAntonymsRelated WordsSynonymsLegend:
Noun1.authentication - a mark on an article of trade to indicate its origin and authenticityauthentication - a mark on an article of trade to indicate its origin and authenticity
marking, mark, marker - a distinguishing symbol; "the owner's mark was on all the sheep"
2.authentication - validating the authenticity of something or someoneauthentication - validating the authenticity of something or someone
validation, substantiation, proof - the act of validating; finding or testing the truth of something

authentication

noun
Translations

authentication

[ɔːˌθentɪˈkeɪʃn] Nautentificación f, autenticación f

authentication

[ɔːˌθɛntɪˈkeɪʃən] nauthentification f

authentication

nBestätigung f, → Authentifizierung f (geh); (of signature, document)Beglaubigung f; (of manuscript, work of art)Echtheitserklärung f
References in periodicals archive ?
Configured using its Access Control System Software, Keri Systems' line of access controllers manages access into buildings and into interior areas of buildings.
Although businesses have long realized the necessity of smart card-based physical access control, the adoption of smart card-based logical access control is occurring at a slower rate.
Computer access control systems are designed to control which users or groups of users can invoke programs and access system resources such as databases and files.
At that time, there were almost no products that used RBAC, and the concept of using roles for access control was not well defined.

Full browser ?