Access Control Service

Results: 826



#Item
91Computer access control / Identity management / Computer security / Computing / Federated identity / SOA Security / Security Assertion Markup Language / WS-Security / Single sign-on / Identity management system / Service-oriented architecture / Information Card

Dynamic Business Service Networks using Virtual Organisations

Add to Reading List

Source URL: www.crosschecknet.com

Language: English - Date: 2010-01-11 16:40:17
92Internet privacy / Hypertext Transfer Protocol / Computing / Computer access control / HTTP cookie / Computer security / Cyberspace / Local shared object / Session / Evercookie / Secure cookies

UseLab Sp. z o. o. respect a privacy of www.uselab.pl Users. The implementation of this policy aims to inform Users how they can protect their privacy during using the Service. Therefore, we encourage you to familiarize

Add to Reading List

Source URL: www.uselab.pl

Language: English - Date: 2016-02-13 07:41:17
93Identity management / Computer access control / Computer network security / Authentication / Notary / Packaging / Knowledge-based authentication / Layered security / Analytics / Identity verification service / LexisNexis

White Paper The Role of Knowledge Based Authentication (KBA) In Identity Proofing Knowledge Based Authentication [KBA]

Add to Reading List

Source URL: lexisnexis.com

Language: English - Date: 2014-10-15 08:44:07
94Computing / Computer access control / Prevention / Cloud computing / Cloud infrastructure / Password / Identity management / SAML-based products and services / Central Authentication Service

CAS’s IDP system and resources in Education Cloud DAREN ZHA CANS2015, Chengdu Outline

Add to Reading List

Source URL: free.eol.cn

Language: English - Date: 2015-09-28 11:36:24
95Fingerprinting algorithms / Cyberwarfare / Denial-of-service attack / Denial-of-service attacks / Internet Relay Chat / Fingerprint / Internet privacy / Security / Surveillance / Access control

Website Fingerprinting Attacking Popular Privacy Enhancing Technologies with the Multinomial Naïve-Bayes Classifier Dominik Herrmann, Hannes Federrath University of Regensburg, Germany

Add to Reading List

Source URL: digitalpiglet.org

Language: English - Date: 2009-11-27 08:33:02
96Computer access control / Identity management / Computer security / Identity / Federated identity / Cloud standards / OAuth / Information Card / Location-based service / Internet privacy / Authentication / Identity management system

The Case for a Location Metasystem Nick Doty School of Information, UC Berkeley ABSTRACT

Add to Reading List

Source URL: npdoty.name

Language: English - Date: 2014-03-25 02:38:49
97Computer security / Security / Computer access control / Identity management / Fraud / Identity theft / Authentication / Identity fraud / LexisNexis / Biometrics / Identity verification service / RELX Group

White Paper Combating Identity Fraud: An Overview of Complementary Approaches Identity fraud demands constantly evolving

Add to Reading List

Source URL: lexisnexis.com

Language: English - Date: 2014-10-15 08:43:57
98Computer access control / Computer security / Cryptography / Access control / Password / Authentication / Challengeresponse authentication / Security question / Self-service password reset / Password policy

Central Authentication Service Level 2 Security Instructions KFS will be implementing an additional layer of security to address an audit finding regarding our system access. Similar to other systems, KFS will ask users

Add to Reading List

Source URL: www.fmo.hawaii.edu

Language: English - Date: 2014-07-21 21:53:18
99Computing / Tunneling protocols / Logical link control / Internet Standards / Modems / Point-to-point protocol over Ethernet / Network architecture / 6WIND / Data Plane Development Kit / Network function virtualization / Layer 2 Tunneling Protocol / Point-to-Point Protocol

Enabling High-performance NFV for New Generation BRAS Services Telecom service providers are migrating edge, access and CPE networking infrastructure to open, programmable, software-based appliances with network function

Add to Reading List

Source URL: www.6wind.com

Language: English - Date: 2014-04-11 20:43:26
100Cryptography / Computer access control / PBKDF2 / Pseudorandom function family / Password / Challengeresponse authentication / Security token

The Pythia PRF Service Adam Everspaugh? , Rahul Chatterjee? , Samuel Scott?? , Ari Juels† , and Thomas Ristenpart‡ ? University of Wisconsin–Madison, {ace,rchat}@cs.wisc.edu ?? Royal Holloway, University of London,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-09-17 14:36:44
UPDATE