Access control

Results: 10445



#Item
581Virtual reality / Social networking service / Internet / Social network / Social media marketing / Social software

A Social Networking-Based Access Control Scheme for Personal Content Kiran K. Gollu U. of Toronto Stefan Saroiu U. of Toronto

Add to Reading List

Source URL: www.sosp2007.org

Language: English - Date: 2016-06-15 13:09:51
582Computer access control / Password / Security / Web portal / Login / Form

LOPR Portal Notification User Guide Regulatory Division Bourse de Montréal Inc. Document Revision: 1.0

Add to Reading List

Source URL: reg.m-x.ca

Language: English - Date: 2016-05-03 12:26:22
583Start menu / Password / Computer access control

RURAL/ITER TRAINING PLATFORM

Add to Reading List

Source URL: www.ruraliter.eu

Language: English - Date: 2015-02-04 03:04:45
584Access control / Role-based access control / Ls / Zip / Email / Counterpoint / Outlook.com

COUNTERPOINT/SOFT SKULL PERMISSIONS REQUEST FORM If you are using an excerpt or selection from one of our books you must secure written permission. Please fill out our permissions request form and send by email to permi

Add to Reading List

Source URL: softskull.com

Language: English - Date: 2015-10-09 13:23:11
585Internet privacy / Computer access control / HTTP cookie / Hypertext Transfer Protocol / Proprietary software / Ancestry.com / Computer virus / World Wide Web / Email / Web browser / AOL / Internet

GENEALOGY COMPUTER SOCIETY OF GEORGIA April 8 Volume 8 Issue 4

Add to Reading List

Source URL: s266133961.onlinehome.us

Language: English - Date: 2009-06-18 21:16:02
586Internet privacy / Computer access control / HTTP cookie / Hypertext Transfer Protocol / Password / Zombie cookie / P3P

Privacy Policy In order to better serve our customers, www.cvsmidwesttapes.ca uses cookies. A cookie is a small piece of information that is planted in your browser. Our cookies contain an ID number that enables our webs

Add to Reading List

Source URL: media.midwesttapes.com

Language: English - Date: 2010-06-16 21:54:05
587Presentation software / Computer access control / HTTP cookie / Hypertext Transfer Protocol / Internet privacy / Microsoft PowerPoint

ERIN DIONNE middle grade/young adult author www.erindionne.com • •

Add to Reading List

Source URL: erindionne.com

Language: English - Date: 2013-07-09 19:18:54
588Computer access control / Ubiquitous computing / Wireless / Automatic identification and data capture / Privacy / Radio-frequency identification / Security token / Authentication / Password / Contactless smart card / Multi-factor authentication

Treat ’Em Like Other Devices: User Authentication of Multiple Personal RFID Tags Nitesh Saxena Md. Borhan Uddin

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2009-06-18 13:43:33
589Access control / Nuclear command and control / Two-man rule

Local Policy on Key Distribution 1.0 Policy It is recognized that keys to the union office need to be distributed to specific members

Add to Reading List

Source URL: 2424.cupe.ca

Language: English - Date: 2013-03-01 12:17:20
590Computer access control / E-commerce / Certificate authorities / Public-key cryptography / Federated identity / Authentication / Digital identity / Entrust / Public key certificate / IdenTrust / Peer-to-peer / Identity management

Identity Authentication: Increasing Confidence in Peer-to-Peer Networks IdenTrust B

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2016-05-19 18:52:40
UPDATE