Impersonation
Impersonation
The following texts are the property of their respective authors and we thank them for giving us the opportunity to share for free to students, teachers and users of the Web their texts will used only for illustrative educational and scientific purposes only.
The information of medicine and health contained in the site are of a general nature and purpose which is purely informative and for this reason may not replace in any case, the council of a doctor or a qualified entity legally to the profession.
Informatics and computer science
Meanings, explanations, notes, information and links about the terminology used in informatics and computer science
Impersonation
Meaning of term impersonation
The ability of a process to run in a specified security context--as a specified user, for example--and thereby access resources authorized for that security context. Impersonation is used in Web applications to provide a security-enhanced user context for
Acronym :
Source: http://www.okdhs.org/nr/rdonlyres/3f6765df-14d1-47c5-ad01-c891fa101254/0/glossary_okdhs_03142007.xls MSN
Author : not indicated on the source document of the above text
If you are the author of the text above and you not agree to share your knowledge for teaching, research, scholarship (for fair use as indicated in the United States copyrigh low) please send us an e-mail and we will remove your text quickly.
Google key word : impersonation
Links to further information about impersonation :
As soon as possible we will add more links
Impersonation
If you want to quickly find the pages about a particular topic as impersonation use the following search engine:
Informatics and computer science
Meaning of impersonation
Please visit our home page
Larapedia.com Terms of service and privacy page