ACL

Also found in: Medical, Acronyms, Encyclopedia, Wikipedia.
(redirected from Access control list)

ACL

abbr.
anterior cruciate ligament
American Heritage® Dictionary of the English Language, Fifth Edition. Copyright © 2016 by Houghton Mifflin Harcourt Publishing Company. Published by Houghton Mifflin Harcourt Publishing Company. All rights reserved.

ACL

abbreviation for
(Anatomy) anterior cruciate ligament
Collins English Dictionary – Complete and Unabridged, 12th Edition 2014 © HarperCollins Publishers 1991, 1994, 1998, 2000, 2003, 2006, 2007, 2009, 2011, 2014
Mentioned in
References in periodicals archive
The implementation of successful information security implementations should thus include addressing of culture Technical T1 Access control lists can be translated into electronic polices using open standards such as XACML and implemented using SAML T2 Service Oriented Architectures and Web Services can be used for technical interoper-ability; in addition semantic interoperability can be achieved through use of ontologies T4 In general, Security Objectives are Confidentiality which includes authentication, authorization and access control and privacy, Integrity, Availability and Account-ability which includes Trust and Non repudiation Table 2.
In particular, this Note uses the concept of access control lists
Here each first-column entry identifies an access equivalence set -- a set of objects that have the same access control information; the set of rows with a common first column value is the access control list for the object class identified.
It supports Advanced Cyber Security features including DHCP Snooping, IP Source Guard, Dynamic ARP Inspection, L2/L3/L4 Access Control List (ACL) and Advanced Cyber Redundancy features including MSR, SuperChain, ITU-T G.8032 ERPS to ensure secured and non-stop transmissions.
By combining powerful sensitive data discovery capabilities with integrated Access Control List (ACL) permissions as defined in Apache Sentry, Apache Ranger or MapR's ACLs, enterprises can see complete sensitive data access and entitlement within Hadoop.
Arkeia's agents for the Novell Storage Services (NSS) file system include support for NSS trustee and access control list (ACL) models, as well as iFolder support.
For each new call, XelorRate evaluates available bandwidth and delay bounds along the end-to-end path of the call and can control network resources proactively by assigning the appropriate bandwidth allocation and flow treatment with access control list entries on the access ports closest to the source and destination of the call.--Xelor Software
Copyright © 2003-2025 Farlex, Inc Disclaimer
All content on this website, including dictionary, thesaurus, literature, geography, and other reference data is for informational purposes only. This information should not be considered complete, up to date, and is not intended to be used in place of a visit, consultation, or advice of a legal, medical, or any other professional.