- user identity
- 1) Компьютерная техника: идентификационная информация пользователя2) Вычислительная техника: идентификатор пользователя
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
Removable User Identity Module — (R UIM) is a card developed for CDMA handsets that extends the GSM SIM card to CDMA phones and networks. To work in CDMA networks, the R UIM contains an early version of the CSIM application. The card also contains SIM (GSM) application, so it… … Wikipedia
Network User Identity — Network User Identity, NUI … Universal-Lexikon
Identity 2.0 — Identity 2.0, also called digital identity, is the anticipated revolution of identity verification on the internet using emerging user centric technologies such as Information Cards or OpenID. Identity 2.0 stems from the Web 2.0 theory of the… … Wikipedia
Identity and Access Management — (IAM) is a concept that combines business processes, policies and technologies that enable companies to: * provide secure access to any resource. * efficiently control this access. * respond faster to changing relationships. * protect… … Wikipedia
Identity driven networking — (IDN) is the process of applying network controls to a network device access based on the identity of an individual or group of individuals responsible to or operating the device. Individuals are identified, and the network is tuned to respond to … Wikipedia
Identity theft — is a form of stealing another person s identity in which someone pretends to be someone else by assuming that person s identity, typically in order to access resources or obtain credit and other benefits in that person s name. The victim of… … Wikipedia
Identity Commons — is a nonprofit organization incorporated in Florida. Purpose and Principles The purpose of the organization is to support, facilitate, and promote the creation of an open identity layer for the Internet, one that maximizes control, convenience,… … Wikipedia
Identity resolution — is an operational intelligence process, typically powered by an identity resolution engine or middleware stack, whereby organizations can connect disparate data sources with a view to understanding possible identity matches and non obvious… … Wikipedia
Identity document forgery — is the process by which identity documents issued by governing bodies are copied and/or modified by persons not authorized to create such documents or engage in such modifications, for the purpose of deceiving those who would view the documents… … Wikipedia
Identity correlation — Definition In information systems, identity correlation is a process that reconciles and validates the proper ownership of disparate user account login IDs (user names) that reside on systems and applications throughout an organization and can… … Wikipedia
Identity management — In information systems, identity management is the management of the identity life cycle of entities (subjects or objects). An identity management system: # Establishes the identity ## Links a name (or number) with the subject or object; ## Re… … Wikipedia