Access control

Results: 10445



#Item
491Computing / Security / Computer security / Computer access control / Computer systems / Cryptography / National security / Log management / Logfile / Log analysis / Event Viewer / WS-Security

Building Security In Editors: John Steven, Gunnar Peterson, Deborah A. Frincke, Logging in the

Add to Reading List

Source URL: arctecgroup.net

Language: English - Date: 2009-05-28 19:06:28
492Software engineering / Computing / Programming language theory / Computer access control / Subscriber identity module / C

Personal Identification Information in Property Data Code of Conduct Application to become a Code Subscriber When completed this application, together with an executed copy of the ‘Deed of Agreement to the Personal Ide

Add to Reading List

Source URL: www.propertydatacodeofconduct.com.au

Language: English - Date: 2016-05-23 01:44:02
493Internet privacy / Computer access control / HTTP cookie / Hypertext Transfer Protocol / Computing / Computer security / Information privacy / Network Advertising Initiative / Cookie / Zombie cookie

Generic Cookies Policy template    Cookies Policy    Last updated: ​

Add to Reading List

Source URL: media.termsfeed.com

Language: English - Date: 2016-03-07 14:52:12
494Access control / Computer access control / Prevention / Password / Security / Insurance / Login / Form

Phly.com User Guide Insured Version Please use the following index links to quickly access the information being looked for: My PHLY Registration My PHLY Home

Add to Reading List

Source URL: www.phly.com

Language: English - Date: 2016-05-25 17:18:22
495Security / Computer access control / Computing / Cryptography / Access control / Authentication / Authorization / SOAP / Kerberos

An authorization control framework to enable service composition across domains Takashi Suzuki University of California, Berkeley Berkeley, CA

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2002-02-14 23:42:26
496Computing / Cloud standards / Software / Application programming interfaces / Computer access control / OAuth / Mobile app / OpenID / Open API / Mobile backend as a service / Kony /  Inc.

CA Mobile App Services - Data Sheet

Add to Reading List

Source URL: itworldcanada.com

Language: English - Date: 2016-04-14 13:47:19
497Computer security / Computer access control / Access control / Role-based access control / Data security / NIST RBAC model / Role hierarchy / Petri net / PERMIS / XACML / Model-based testing / Reliability engineering

IEEE TRANSACTIONS ON COMPUTERS, MANUSCRIPT ID 1 Automated Model-Based Testing of RoleBased Access Control Using Predicate/Transition Nets

Add to Reading List

Source URL: www.itrust.lu

Language: English - Date: 2015-05-05 11:12:03
498Software / Computing / Digital media / Social networking services / Facebook / Blog hosting services / Photo sharing / Social information processing / Internet privacy / Privacy / Google+ / Recommender system

Understanding and Specifying Social Access Control Lists Mainack Mondal Yabing Liu Bimal Viswanath

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2016-05-19 16:51:30
499Access control / Security / Computer security / Computer access control / Role-based access control / File system / Lattice-based access control / Computer file / Access control list

 DISIͲViaSommarive14Ͳ38123PovoͲTrento(Italy) http://www.disi.unitn.it RELATION BASED ACCESS

Add to Reading List

Source URL: disi.unitn.it

Language: English - Date: 2014-09-10 09:40:14
500Microsoft / Software / Computer access control / Computing / Password / Security / Outlook.com / Login / Form

Student Registration and Login Information Log on. Tune in. Succeed. Your steps to success. STEP 1: Register

Add to Reading List

Source URL: media.pearsoncmg.com

Language: English - Date: 2008-12-29 18:31:29
UPDATE