A list of authorised users, processes or systems. See access control.
Defines the roles that are required to execute a method. Defines the user or group IDs of people who do (or do not) have explicit access to a file or directory.
In computer security, a list that is associated with an object that identifies all the subjects that can access the object and their access rights. For example, an access control list is a list that is associated with a file that identifies the users who can access the file and identifies the users' access rights to that file.