Access control

Results: 10445



#Item
691Identity management / Computer access control / Federated identity / Digital technology / Digital identity / Authentication / Liberty Alliance / Security Assertion Markup Language / Identity theft / Identity / Identity assurance / Electronic authentication

Microsoft PowerPoint - greenwood-OECD-Norway-07-MAY-07.ppt

Add to Reading List

Source URL: www.oecd.org

Language: English - Date: 2016-03-29 12:11:08
692Access control / Role-based access control / Ls / Zip / Email / Counterpoint / Outlook.com

COUNTERPOINT/SOFT  SKULL  PERMISSIONS  REQUEST  FORM     If  you  are  using  an  excerpt  or  selection  from  one  of  our  books  you  must  secure  w

Add to Reading List

Source URL: softskull.com

Language: English - Date: 2015-10-09 13:23:09
693National Security Agency / Security-Enhanced Linux / Mandatory access control / Type enforcement / Multilevel security / Linux kernel / File system permissions

Adding Ramparts to Your Bastille An Introduction to SELinux Hardening Def Con 24 Packet Capture Village Jay Beale

Add to Reading List

Source URL: www.inguardians.com

Language: English - Date: 2016-08-05 14:35:56
694Identity management / Computer access control / Federated identity / Internet Standards / Shibboleth / Security Assertion Markup Language / Privacy policy / Authentication / Internet privacy / Privacy

Building and (inter)operating AA services. A tour into reality TERENA Mini Symposium on AA Prague, 24 October 2002

Add to Reading List

Source URL: papi.rediris.es

Language: English - Date: 2007-10-13 04:03:52
695Cloud computing / Computer security / Computer access control / Computer network security / Virtual private cloud / Cloud computing security / Authentication / Internet security / Privileged identity management

denial-of-service spoofing application delivery controller (ADC)

Add to Reading List

Source URL: cloudschool.com

Language: English - Date: 2016-06-06 17:05:54
696Computer access control / Cryptography / Cybercrime / Password / Security / Computer security / Multi-factor authentication / Authentication / Outline of computer security / Password manager

December 10, 2015 To: Campus Community Fr: Matthew Hall, Associate Vice Chancellor for Information Technology & Chief Information Officer

Add to Reading List

Source URL: cio.ucsb.edu

Language: English - Date: 2015-12-10 11:26:51
697Biometrics / Security / Computer access control / Identification / Surveillance / Speaker recognition / Password / Authentication / Computer security

Copyright 2013 Society of Photo Optical Instrumentation Engineers. One print or electronic copy may be made for personal use only. Systematic reproduction and distribution, duplication of any material in this paper for a

Add to Reading List

Source URL: www.wjscheirer.com

Language: English - Date: 2013-07-07 22:38:19
698Computer access control / Identity management / Federated identity / Security / Computer security / Single sign-on / Authentication / Password / Information security / Privacy / Health Insurance Portability and Accountability Act / Electronic authentication

Privacy Implications for Single Sign-on Authentication In a Hospital Environment Rosa R. Heckle Wayne G. Lutters

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-06-22 15:47:38
699Computer access control / Access control / XACML / Role-based access control / PERMIS / Authorization / Role hierarchy / Data integration / Spring Framework / Attribute-Based Access Control / OAuth

Role-Based Access Control for e-Service Integration Peter Lamb, Robert Power, Gavin Walker and Michael Compton CSIRO ICT Centre GPO Box 664 Canberra ACT 2601 Australia +

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-06-02 01:58:17
700

Schreibtischverlängerung dank Access-Control-System von HIN

Add to Reading List

Source URL: tie.ch

Language: German - Date: 2011-06-21 03:40:00
    UPDATE