Access control

Results: 10445



#Item
241Security / Prevention / Safety / Access control / Identity management / Computer security / Data security / Computer access control / Internet privacy / Privacy / Information security / Personal /  Inc.

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-07-16 07:20:49
242Computer access control / Cryptography / Software / Password / Security / Cryptographic software / Random password generator / Passwd / Passphrase / Keeper / Crypt / KeePass

Central Connecticut State University Elihu Burritt Library Newsletter CRASH Shown at Burritt Library

Add to Reading List

Source URL: library.ccsu.edu

Language: English - Date: 2010-07-26 11:08:41
243Software / Computer access control / Login / Computing

Viewer Download The next window that appears will be the login screen. This page is divided up into two steps. The first step is if for those visiting the site for the first time. The second step is split for those that

Add to Reading List

Source URL: co.wayne.in.us

Language: English - Date: 2002-10-31 12:41:00
244Computer access control / Cryptography / Computer security / Prevention / Multi-factor authentication / Authentication / Financial technology / Password

CASE STUDY Cyber-security offering strong, cost effective two factor authentication. Small businesses

Add to Reading List

Source URL: www.digitalcatapultcentre.org.uk

Language: English - Date: 2016-03-09 06:12:58
245Software / Digital media / Computing / Social networking services / Social media / Facebook / Blog hosting services / Social information processing / Internet privacy / Privacy / Facebook like button / Recommender system

Beyond Access Control: Managing Online Privacy via Exposure Mainack Mondal, Peter Druschel, Krishna P. Gummadi Alan Mislove

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2014-02-14 13:03:11
246Computer access control / Identity management / Identity / Federated identity / OpenID / Digital identity / Internet privacy / Privacy / Online identity / Identity 3.0

Microsoft Word - ACTIVITIES - OISTE workshop reportdoc

Add to Reading List

Source URL: www.iked.org

Language: English - Date: 2012-11-14 04:38:45
247Computer access control / Computer security / Computing / Security token / Multi-factor authentication / Authentication / RSA SecurID / Mutual authentication / OAuth / OpenID / Electronic authentication / Extensible Authentication Protocol

Bring Your Own Device For Authentication (BYOD4A) – The Xign–System Norbert Pohlmann . Markus Hertlein . Pascal Manaras Institute for Internet-Security Westphalian University of Applied Sciences {pohlmann | hertlein

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-11-20 14:35:18
248Software engineering / Security / Computer programming / Access control / Computer access control / Kernel / JavaScript / Object-oriented programming / Data-flow analysis / Database / Program analysis

Leveraging “Choice” to Automate Authorization Hook Placement Divya Muthukumaran Trent Jaeger

Add to Reading List

Source URL: www.cse.psu.edu

Language: English - Date: 2012-12-21 22:14:54
249Cryptography / Computing / Computer access control / Transport Layer Security / Public-key cryptography / Cryptographic protocols / Secure communication / Man-in-the-middle attack / Mutual authentication / Authentication / Public key infrastructure / Phishing

IdenTrust™: Beyond SSL and Multifactor Authentication Eliminating Man-in-the-Middle Attacks with IdenTrust™ A Preventative, Proactive Approach to Securing Electronic Transactions Many financial institutions believe t

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2014-05-01 19:01:13
250Computing / Computer access control / HTTP cookie / Hypertext Transfer Protocol / Internet privacy / Cayuse / User / Point and click / Software / Computer security

UCI Cayuse 424 Quick Start Guide for Principal Investigator’s Professional Profile Getting Started Cayuse 424 is supported in recent versions of Firefox

Add to Reading List

Source URL: www.research.uci.edu

Language: English - Date: 2016-04-08 18:31:46
UPDATE