Impersonation

 


 

Impersonation

 

The following texts are the property of their respective authors and we thank them for giving us the opportunity to share for free to students, teachers and users of the Web their texts will used only for illustrative educational and scientific purposes only.

 

 

The information of medicine and health contained in the site are of a general nature and purpose which is purely informative and for this reason may not replace in any case, the council of a doctor or a qualified entity legally to the profession.

 

 

Informatics and computer science

 

Meanings, explanations, notes, information and links about the terminology used in informatics and computer science

 

Impersonation

 

Meaning of term impersonation

The ability of a process to run in a specified security context--as a specified user, for example--and thereby access resources authorized for that security context. Impersonation is used in Web applications to provide a security-enhanced user context for

 

Acronym :

 

Source: http://www.okdhs.org/nr/rdonlyres/3f6765df-14d1-47c5-ad01-c891fa101254/0/glossary_okdhs_03142007.xls MSN

Author : not indicated on the source document of the above text

If you are the author of the text above and you not agree to share your knowledge for teaching, research, scholarship (for fair use as indicated in the United States copyrigh low) please send us an e-mail and we will remove your text quickly.

 

Google key word : impersonation

 

Links to further information about impersonation :

As soon as possible we will add more links

 

Impersonation

 

If you want to quickly find the pages about a particular topic as impersonation use the following search engine:

 

 

 

Informatics and computer science

 

Meaning of impersonation

 

Please visit our home page

 

 

Larapedia.com Terms of service and privacy page

 

 

 

Impersonation