Access control

Results: 10445



#Item
701Computer security / Cryptography / Identity management / Computer network security / Security / Password / Information technology controls / Security controls / Access control

Security Strategy White Paper This white paper references Health Insurance Portability and Accounting Act () Security strategies that QSI clients may pursue to help conform their use of the system to meet the Security Pr

Add to Reading List

Source URL: www.qsii.com

Language: English - Date: 2014-01-28 14:18:07
702Computer access control / Password / Security / Draw a Secret / Identity management / Cognitive password

The Impact of Cues and User Interaction on the Memorability of System-Assigned Recognition-Based Graphical Passwords Mahdi Nasrullah Al-Ameen, Kanis Fatema, Matthew Wright, Shannon Scielzo The University of Texas at Arli

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-02-21 12:56:56
703Internet privacy / Privacy / Identity documents / Computer access control / HTTP cookie / Hypertext Transfer Protocol / Google Analytics / Personally identifiable information / Information privacy / Password / P3P / Zombie cookie

COMPANY SHOP LIMITED – PRIVACY POLICY Company Shop Limited (we) are committed to protecting and respecting your privacy. This policy (together with our Terms and Conditions, http://www.staffshop.co.uk and any other doc

Add to Reading List

Source URL: community-shop.co.uk

Language: English - Date: 2015-06-05 11:14:41
704Information privacy / Privacy / Internet privacy / Computer access control / HTTP cookie / Hypertext Transfer Protocol / London Stock Exchange / Privacy policy / Personally identifiable information / Google Analytics / Opt-out / Data Protection Act

INFORMATIVE DOCUMENT AS PER ART. 13 LEGISLATIVE DECREE 196 OF JUNE "PROTECTION OF PERSONS AND OTHERS WITH RESPECT TO THE PROCESSING OF PERSONAL DATA" The Code on the protection of personal data, adopted with the

Add to Reading List

Source URL: www.mtsmarkets.com

Language: English - Date: 2015-06-25 09:15:24
705Computer network security / Computer access control / ESET / Multi-factor authentication / Authentication / OpenVPN / Virtual private network / RADIUS / Password / Internet Authentication Service / Electronic authentication

logotype - ESET Secure Authentication

Add to Reading List

Source URL: static4.esetstatic.com

Language: English - Date: 2015-07-29 05:51:23
706Media access control / Covert channel / Steganography / Information theory / Carrier sense multiple access / ALOHAnet / Channel / Network packet

Covert Channels in Multiple Access Protocols Seyed Ali Ahmadzadeh Gordon B. Agnew University of Waterloo, Canada

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2011-08-01 22:51:56
707E-commerce / Computer security / Access control / Identity management / Security / Password / Public key certificate

JACKSON MUNICIPAL AIRPORT AUTHORITY (JMAA) PERSONNEL AND VEHICLE ACCESS MEDIA APPLICATION REQUIREMENTS All persons working on the premises at Jackson-Evers International Airport (JEIA) are required to obtain and display

Add to Reading List

Source URL: www.jmaa.com

Language: English - Date: 2013-01-09 15:19:56
708Internet privacy / Privacy / Computer access control / HTTP cookie / Hypertext Transfer Protocol / Information privacy / Personally identifiable information / P3P / In re Gateway Learning Corp.

Information we collect: COOKIES This website may sometimes make use of cookies especially where we are using an analytics program to monitor visitor behaviour & site usage; WHAT ARE COOKIES? Small files stored on your co

Add to Reading List

Source URL: www.ronebhal.co.uk

Language: English - Date: 2015-09-30 00:34:33
709Static single assignment form / Distribution / Distributed data storage

3336 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 63, NO. 9, SEPTEMBER 2015 Fast Desynchronization for Decentralized Multichannel Medium Access Control

Add to Reading List

Source URL: www.ee.ucl.ac.uk

Language: English - Date: 2015-09-29 09:16:14
710Access control / Computer security / Identity management / Perimeter security / Physical security / Usability / Password / Internet privacy / User / Privacy concerns with social networking services / Mobile security

Lessons Learned From the Deployment of a Smartphone-Based Access-Control System Lujo Bauer Lorrie Faith Cranor

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-05-31 14:34:10
UPDATE