Access control

Results: 10445



#Item
331Business / Web accessibility / Web development / Professional studies / Systems engineering / Usability / Web design / Purchasing / Section 508 Amendment to the Rehabilitation Act / Common Criteria / Radiation Control for Health and Safety Act

Section 508 Evaluation Template

Add to Reading List

Source URL: access.sdsu.edu

Language: English - Date: 2014-11-06 18:21:18
332Internet privacy / Hypertext Transfer Protocol / World Wide Web / Computing / Computer access control / HTTP cookie / Cyberspace / Targeted advertising / Session / Zombie cookie

Tyco Cookie Policy Tyco and its group companies (together “Tyco”, “we”, “us”, “our”) use “cookies” for certain areas of our websites. Cookies are very commonly used on websites. They are small data fi

Add to Reading List

Source URL: tycofsbp.com

Language: English - Date: 2015-09-02 13:59:15
333Computer access control / Usability / Prevention / Computer security / Security / Password / Authentication / Usability of web authentication systems

Microsoft Word - Document1

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-07-03 02:38:40
334Software / Computing / Free software / Internet privacy / Computer access control / Computer networking / Network performance / Proxy server / Information flow / Server / HTTP cookie / World Wide Web

Server-driven Outbound Web-application Sandboxing FP7-ICT, Project Nohttps://www.websand.eu Deliverable D3.3

Add to Reading List

Source URL: websand.eu

Language: English - Date: 2015-05-06 05:08:50
335Computing / Computer security / Security / Identity management / Computer access control / Cloud infrastructure / XACML / PaaSage / Security Assertion Markup Language / Cloud computing

Security Enforcement for Multi-Cloud Platforms K. Kritikos (FORTH), T. Kirkham (STFC), B. Kryza (AGH) & P. Massonet (CETIC

Add to Reading List

Source URL: cf2015.holacloud.eu

Language: English - Date: 2015-10-12 10:38:44
336Computing / World Wide Web / Alphabet Inc. / Digital media / Cataloging / Google Search / Google / Online Audiovisual Catalogers / Search engine optimization / Authority control / Resource Description and Access

Microsoft Word - lang.doc

Add to Reading List

Source URL: unllib.unl.edu

Language: English - Date: 2011-04-27 16:56:32
337Computer access control / Computer security / Cryptography / Identity management / Password / Security / Challengeresponse authentication / Crypt / Password synchronization / Password policy

Fischer Identity™ Turn Identity Management into a Strategic Advantage Password Reset & Synchronization

Add to Reading List

Source URL: www.fischerinternational.com

Language: English - Date: 2016-06-03 10:12:26
338Cryptography / Computer access control / Obfuscation / Password / Security / Crypt / Cryptographic software / Password policy / Password strength

Directions To Open Encrypted E-Mails From The State Of Utah When you open an encrypted e-mail from the State of Utah you will see the following message: Depending on which e-mail program you use, you may also see the f

Add to Reading List

Source URL: laborcommission.utah.gov

Language: English - Date: 2015-09-15 11:55:14
339Cryptography / Computer access control / Signature / Computer law / E-commerce / Cryptography standards / Authentication / Biometrics / Electronic signature / RSA SecurID / Public key certificate / Qualified electronic signature

Confirmation pursuant to § 18 para. 5 SigG

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2016-06-27 03:25:11
340Computer security / Security / Computer access control / Open standards / Internet of Things / Ambient intelligence / Authentication / Open Connectivity Foundation / Identity management

Identity and Access Management for Smart Home Devices

Add to Reading List

Source URL: nccoe.nist.gov

Language: English - Date: 2016-06-03 07:49:14
UPDATE