Access control

Results: 10445



#Item
61DOMINION® SX II  NEXT GENERATION SERIAL CONSOLE SERVER The Dominion SX II is Raritan’s next-generation Serial Console Server (Terminal Server) that provides IT and network administrators secure IP access and control

DOMINION® SX II NEXT GENERATION SERIAL CONSOLE SERVER The Dominion SX II is Raritan’s next-generation Serial Console Server (Terminal Server) that provides IT and network administrators secure IP access and control

Add to Reading List

Source URL: ram.raritanassets.com

- Date: 2016-08-04 16:13:34
    62PARAGON® II  A FLEXIBLE, SECURE CAT5 ANALOG KVM SOLUTION Paragon II is a Cat5 analog KVM solution that provides up to 64 users with secure, non-blocked access and control of data center devices. Its rich suite of manage

    PARAGON® II A FLEXIBLE, SECURE CAT5 ANALOG KVM SOLUTION Paragon II is a Cat5 analog KVM solution that provides up to 64 users with secure, non-blocked access and control of data center devices. Its rich suite of manage

    Add to Reading List

    Source URL: ram.raritanassets.com

    - Date: 2016-10-17 17:08:07
      63Security Policies Security and privacy of information is a top priority of ComplyWorks. Providing a solution that ensures all information providers are always in control of who can access their data is critical to our su

      Security Policies Security and privacy of information is a top priority of ComplyWorks. Providing a solution that ensures all information providers are always in control of who can access their data is critical to our su

      Add to Reading List

      Source URL: new.complyworks.com

      - Date: 2016-05-25 13:30:22
        64DRAFT – Please Do Not Distribute  April 17, 2016 Verifiable Anonymous Identities and Access Control in Permissioned Blockchains

        DRAFT – Please Do Not Distribute April 17, 2016 Verifiable Anonymous Identities and Access Control in Permissioned Blockchains

        Add to Reading List

        Source URL: static1.squarespace.com

          65OBSERVATION-BASED FINE GRAINED ACCESS CONTROL FOR RELATIONAL DATABASES Raju Halder and Agostino Cortesi Dipartimento di Informatica, Universit`a Ca’ Foscari di Venezia, Venezia, Italy ,

          OBSERVATION-BASED FINE GRAINED ACCESS CONTROL FOR RELATIONAL DATABASES Raju Halder and Agostino Cortesi Dipartimento di Informatica, Universit`a Ca’ Foscari di Venezia, Venezia, Italy ,

          Add to Reading List

          Source URL: www.dsi.unive.it

          - Date: 2010-07-27 05:10:04
            66Attribute-Based Access Control - insider threats, security, privacy and trust

            Attribute-Based Access Control - insider threats, security, privacy and trust

            Add to Reading List

            Source URL: comsec.spb.ru

            - Date: 2015-12-03 06:47:14
              67Using Directional Antennas for Medium Access Control in Ad Hoc Networks  

              Using Directional Antennas for Medium Access Control in Ad Hoc Networks  

              Add to Reading List

              Source URL: disc.ece.illinois.edu

              - Date: 2015-10-06 17:33:36
                6868  Martin Paul Eve  Before the law: open access, quality control and the future of peer review

                68  Martin Paul Eve Before the law: open access, quality control and the future of peer review

                Add to Reading List

                Source URL: eprints.bbk.ac.uk

                - Date: 2015-08-11 09:11:38
                  69Facts about Domestic Violence and Economic Abuse WHAT IS ECONOMIC ABUSE? When an abuser takes control of or limits access to shared or individual assets or limits the current or future earning potential of the victim as

                  Facts about Domestic Violence and Economic Abuse WHAT IS ECONOMIC ABUSE? When an abuser takes control of or limits access to shared or individual assets or limits the current or future earning potential of the victim as

                  Add to Reading List

                  Source URL: www.ncadv.org

                  - Date: 2016-04-08 11:22:29
                    702014 IEEE 6th International Conference on Cloud Computing Technology and Science  STOVEPipe: Observable Access Control of User Data for Untrusted Applications on Mobile Devices Jiaqi Tan, Utsav Drolia, Rolando Martins, R

                    2014 IEEE 6th International Conference on Cloud Computing Technology and Science STOVEPipe: Observable Access Control of User Data for Untrusted Applications on Mobile Devices Jiaqi Tan, Utsav Drolia, Rolando Martins, R

                    Add to Reading List

                    Source URL: www.pdl.cmu.edu

                    - Date: 2015-03-09 19:03:40