Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Privileging, defined

Under adequate access control, management chooses an administrator who grants privileges and individual passwords to authorized users, thereby defining the scope of the functions that are available to each user. Whenever an individual user logs on to a system that is subject to access control using a password, his or her unique set of privileges become available to him or her. [Pg.1039]

The administrator is responsible for the handling of the function of granting accesses and privileges to users, but the actual responsibility of defining specific users privileges and access must be decided by management and is best handled through a written SOP. [Pg.1039]

Access control decision function are defined using access right lists,7 such as Access Control Lists (ACLs), and these allow the allocation of use, read, write, execute, delete, or create privileges. Access controls enable a system to be designed in such way that a supervisor, for example, will be able to access information on a group of employees, without everyone else on the network having access to this information. [Pg.108]

Computerized physician provider order entry (CPOE) is defined as the computer system that allows direct entry of medical orders by the physician or person with appropriate licensure and privileges to do so. Directly entering orders into a computer has the benefit of reducing errors by minimizing the errors caused by handwritten orders, but even a greater benefit is realized when the combination of CPOE and clinical decision-support tools is implemented together. [Pg.93]

The contribution of this paper is the definition of four different kinds of components for distributed event collection, according to the way they interact with the database and with the outside world. It also generically defines three types of information that are handled by the application. This structure is very important in terms of security, because it allows a strong separation of privileges at the table and column level (for databases that support it), between insertions, modifications, access and deletion. We are also able to effectively leverage the consistency mechanisms of SQL (foreign keys and references) to ensure that event information remains consistent over time. [Pg.364]

When used for relative similarity and diversity, only potential pharmacophores that contain the defined special centre-type are used. The frame of reference for similarity/diversity studies is thus changed to one that is focused on the feature of interest distances are now measured relative to this special centre. For example, the special centre could be the centroid of a substructure [10] such as biphenyl tetrazole or diphenylmethane, enabling the calculation and comparison of all 3D pharmacophoric shapes that contain this substructure the substructure is said to be privileged . For structure-based design, the potential pharmacophores in a site can be restricted to those that contain a specific site point (e.g. in a pocket, or at the entrance to a pocket). In the context of combinatorial library design, the relative measure can be those pharmacophoric shapes that contain a special site-point that represents where the attachment point for a reagent would be. In figure 1, the special point would be centre-type number 3, which can be reserved for this purpose. [Pg.69]

As a general statement it can be concluded that macromolecular conformations different fi om the predominant coil structure are still the exception. Defined spherical secondary-structures have not been obtained by means of noncovalent interactions, since there is no synthetic concept available, distinguishing between inter- and intra-molecular interactions. Formation of globular structures by linear macromolecules is still a privilege of biomolecules where intermolecular interactions are counteracted by well-coordinated intermolecular interactions [50,51]. Synthetic nanospheres can be obtained by the stepwise synthesis of dendrimers [15] or by polymerization of microgels [52] (see below). [Pg.95]

Logical security requirements and procedures for migrating these risks in a SCADA system may include defining access privileges, authorization, and controlling user access to the SCADA system ... [Pg.636]


See other pages where Privileging, defined is mentioned: [Pg.152]    [Pg.442]    [Pg.259]    [Pg.506]    [Pg.106]    [Pg.20]    [Pg.28]    [Pg.29]    [Pg.131]    [Pg.160]    [Pg.179]    [Pg.290]    [Pg.149]    [Pg.364]    [Pg.256]    [Pg.99]    [Pg.105]    [Pg.8]    [Pg.348]    [Pg.32]    [Pg.355]    [Pg.190]    [Pg.72]    [Pg.59]    [Pg.32]    [Pg.748]    [Pg.14]    [Pg.120]    [Pg.53]    [Pg.40]    [Pg.79]    [Pg.88]    [Pg.18]    [Pg.30]    [Pg.89]    [Pg.263]    [Pg.179]    [Pg.517]    [Pg.238]    [Pg.371]   
See also in sourсe #XX -- [ Pg.373 ]

See also in sourсe #XX -- [ Pg.231 ]




SEARCH



Privilege

Privileged

© 2024 chempedia.info