Control system security

Results: 2384



#Item
1812013 IEEE Security and Privacy Workshops  How Usage Control and Provenance Tracking Get Together - A Data Protection Perspective Christoph Bier Fraunhofer Institute of Optronics, System Technologies and Image Exploitatio

2013 IEEE Security and Privacy Workshops How Usage Control and Provenance Tracking Get Together - A Data Protection Perspective Christoph Bier Fraunhofer Institute of Optronics, System Technologies and Image Exploitatio

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2013-05-05 16:04:42
    182About us: Finmeccanica  Centralized Command & Control System Security Integration  Paris, 27 May 2014

    About us: Finmeccanica Centralized Command & Control System Security Integration Paris, 27 May 2014

    Add to Reading List

    Source URL: www.protectrail.eu

    Language: Italian - Date: 2014-07-01 02:55:34
      183CONTROL YOUR HOME  FROM ACROSS THE ROOM OR ACROSS THE WORLD Remotely arm and disarm your Guardian security system using your smartphone, tablet or PC. Receive text and email notifications when children,

      CONTROL YOUR HOME FROM ACROSS THE ROOM OR ACROSS THE WORLD Remotely arm and disarm your Guardian security system using your smartphone, tablet or PC. Receive text and email notifications when children,

      Add to Reading List

      Source URL: www.guardianprotection.com

      Language: English - Date: 2014-09-22 08:54:23
        1842010 No2 University Makes Resetting Passwords Easy Roskilde University controls staff and student access to IT systems via the national digital identity solution which WAYF is connected to. The system lets users reset pa

        2010 No2 University Makes Resetting Passwords Easy Roskilde University controls staff and student access to IT systems via the national digital identity solution which WAYF is connected to. The system lets users reset pa

        Add to Reading List

        Source URL: wayf.dk

        Language: English - Date: 2012-04-24 06:59:18
        1852013 Belgian Safety Authority ANNUAL REPORT Department for Railway Safety and Interoperability (FPS Mobilit y and Transport)

        2013 Belgian Safety Authority ANNUAL REPORT Department for Railway Safety and Interoperability (FPS Mobilit y and Transport)

        Add to Reading List

        Source URL: www.mobilit.belgium.be

        Language: English - Date: 2014-10-17 07:48:31
        186IANA Plenary Report Michelle Cotton Manager, IANA Services ICANN July 2012 IETF-84, Vancouver

        IANA Plenary Report Michelle Cotton Manager, IANA Services ICANN July 2012 IETF-84, Vancouver

        Add to Reading List

        Source URL: iaoc.ietf.org

        Language: English - Date: 2013-04-23 17:49:34
        187A Group-based Authorization Model for Cooperative Systems Klaas Sikkel GMD-FIT, German National Research Center for Information Technology

        A Group-based Authorization Model for Cooperative Systems Klaas Sikkel GMD-FIT, German National Research Center for Information Technology

        Add to Reading List

        Source URL: www.ecscw.org

        Language: English - Date: 2006-12-04 08:09:23
        188WESTERN HEMISPHERE PAYMENTS AND SECURITIES SETTLEMENT FORUM WORKING GROUP ON PAYMENT SYSTEM ISSUES OF LATIN AMERICA AND THE CARIBBEAN (WGPS-LAC) The CPSS-IOSCO Principles: A Latin American and Caribbean

        WESTERN HEMISPHERE PAYMENTS AND SECURITIES SETTLEMENT FORUM WORKING GROUP ON PAYMENT SYSTEM ISSUES OF LATIN AMERICA AND THE CARIBBEAN (WGPS-LAC) The CPSS-IOSCO Principles: A Latin American and Caribbean

        Add to Reading List

        Source URL: www.forodepagos.org

        Language: English - Date: 2014-12-08 12:41:20
        189A LOCKING SYSTEM IS ONLY AS GOOD AS ITS KEY CONTROL. Controlled Duplication: The Key Issue in High Security

        A LOCKING SYSTEM IS ONLY AS GOOD AS ITS KEY CONTROL. Controlled Duplication: The Key Issue in High Security

        Add to Reading List

        Source URL: www.medeco.com

        Language: English - Date: 2014-08-01 13:43:40
        190User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems

        User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems

        Add to Reading List

        Source URL: ieee-security.org

        Language: English - Date: 2012-05-22 01:33:56