| |||
security context (The security attributes or rules that are currently in effect. For example, the rules that govern what a user can do to a protected object are determined by security information in the user's access token and in the object's security descriptor. Together, the access token and the security descriptor form a security context for the user's actions on the object) |
περιβάλλον ασφαλείας: 2 phrases in 1 subject |
Communications | 2 |