Identity management systems

Results: 1028



#Item
21Computer security / Security / Computer access control / Computer network security / Access control / Identity management / Cryptography / Authentication / Password / Trusted computing base / User / Multilevel security

Computer Security in the Real World Butler W. Lampson1 Microsoft Abstract After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason i

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2000-11-10 16:38:10
22Computing / Cryptography / Identity management / Technology / Landgate / Privacy law / End user / Privacy policy / Internet privacy / Risk management information systems / Privacy / Public key certificate

Schedule of Services and Charges Terms and Conditions 1 Term 1.1 This Agreement shall commence upon the acceptance by InfoTrack of the User’s Licence Agreement and, subject to these terms and conditions. 1.2 InfoTrack

Add to Reading List

Source URL: www.infotrack.com.au

Language: English - Date: 2016-04-25 21:02:11
23Computing / Identity management / Computer access control / Security Assertion Markup Language / SOAP / WS-Security / XML schema

An Incremental Learner for Language-Based Anomaly Detection in XML Harald Lampesberger Department of Secure Information Systems University of Applied Sciences Upper Austria

Add to Reading List

Source URL: spw16.langsec.org

Language: English - Date: 2016-06-05 23:39:24
24Computer access control / Identity management / Identity / Federated identity / Shibboleth / Identity management systems / SAML-based products and services

Identity Services Overview from 3rd Party UK federation commercial identity Providers SHIBBOLETH IdP V3

Add to Reading List

Source URL: www.overtsoftware.com

Language: English - Date: 2015-12-16 10:13:16
25Library science / Information management / Information science / Information / Library card / Interlibrary loan / Library / Public library / Payment systems / Identity theft / Sumter County Library /  FL / Credit card

Circulation Policy Library Board Policy Approved by Live Oak Public Libraries Board of Trustees on March 20, 2012. Effective as of April 1, 2012. The circulation of materials is a basic service of the Live Oak Public Lib

Add to Reading List

Source URL: www.liveoakpl.org

Language: English - Date: 2016-08-01 20:23:14
26Payment systems / Economy / Business / Money / E-commerce / Security / Federated identity / Credit card / Password / Alternative payments / Google Account

Emerald Customer Account Center VersionEmerald Management Suite

Add to Reading List

Source URL: www.iea-software.com

Language: English - Date: 2007-04-05 04:28:49
27Computing / Computer access control / Identity management / Identity management systems / Computer security / Utility software / Metadata standards / Signature / Security Assertion Markup Language / SAML 2.0 / EIDAS / PlayStation Portable

Cross-border eServices for the Future STORK 2.0 Pilots and Live Demos Herbert LEITOLD, A-SIT eFörvaltningsdagarna October 9th, 2014, Stockholm

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2014-11-10 07:43:59
28Computer access control / Computer security / Cryptography / Identity management systems / Self-service password reset / Password / Authentication / One-time password / The Button / Login / Password fatigue / Password strength

TABLE OF CONTENTS Getting Started ~ Activation Process............................................................................... 1 Enrollment Process..................................................................

Add to Reading List

Source URL: its.com.edu

Language: English - Date: 2015-10-02 12:31:25
29Information technology management / Identity management / Crime prevention / Cryptography / National security / IDM / IT service management / Computer security / Heuristic / Intelligent dance music

A Multi-method Approach for User-centered Design of Identity Management Systems Pooya Jaferian, David Botta, Kirstie Hawkey, Konstantin Beznosov University of British Columbia, Vancouver, Canada {pooya,botta,hawkey,bezn

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2009-07-08 23:35:07
30Privacy / Information privacy / Data protection / Identity management / Medical privacy / Internet privacy / Binding corporate rules / Personally identifiable information / Bundesdatenschutzgesetz / Privacy policy

Binding Corporate Rules Privacy (BCRP) Binding Corporate Rules Privacyfor (BCRP)

Add to Reading List

Source URL: webinar-academy.t-systems-mms.com

Language: English - Date: 2015-10-23 01:28:39
UPDATE