Identity control theory

Results: 18



#Item
11Information theory / Principle of least privilege / User Account Control / Malware / Privilege / Superuser / Computing / Software / Privileged Identity Management / Windows Vista / Computer security / System software

Avecto | Solution Brief Solution Brief for Desktops Privilege Guard Features:

Add to Reading List

Source URL: www.axial.co.uk

Language: English - Date: 2013-08-02 09:17:06
12Logic / Personal identity / Counterpart theory / Naming and Necessity / Derek Parfit / Philosophy of self / Digital identity / Identity control theory / Identity / Philosophy / Metaphysics

part ii identity 210 identity As Marsha Hanen points out near the end of Part I, new technologies that have

Add to Reading List

Source URL: idtrail.org

Language: English - Date: 2009-03-27 16:30:49
13Mind / Ethology / Ethics / Identity / Guilt / Emotion / Moral psychology / Identity control theory / Social psychology / Morality / Behavior

Understanding the Moral Person: Identity, Behavior, and Emotion Jan E. Stets University of California, Riverside Opening Remarks

Add to Reading List

Source URL: www.affective-sciences.org

Language: English - Date: 2015-02-14 15:47:46
14Applied mathematics / Credential / Proof of knowledge / Zero-knowledge proof / Access control / NP / IP / Model theory / Cryptographic protocols / Identity management / Security

This is the full version of an extended abstract published in ACM CCS[removed]Posted as Report[removed]on 19 August 2013; revised 8 September[removed]Algebraic MACs and Keyed-Verification Anonymous Credentials Melissa Chase

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2014-09-16 08:51:21
15Computer security / Database management systems / Database / Database theory / European Data Protection Supervisor / Internet privacy / Personally identifiable information / Privacy / Access control / Security / Identity management / Ethics

Specific Privacy Statement

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2013-12-02 04:27:30
16Gender studies / Interpersonal relationships / Sexual orientation / Gender / Self / Affect control theory / David R. Heise / Sexual identity / Emotion / Mind / Behavior / Human behavior

Draft of Schneider, Andreas 2002. “A Possible Link Between Stigmatization of Sexual-Erotic Identities and Sexual Violence”. Sexuality & Culture 6,4 Draft of Schneider, Andreas 2002. “A Possible Link Between Stigmat

Add to Reading List

Source URL: courses.ttu.edu

Language: English - Date: 2005-10-28 00:54:03
17Pain / Suffering / Feeling / Mental processes / Self / Affect control theory / Affect / Trance / Identity / Mind / Philosophy of mind / Ethology

Microsoft Word - SPQ.docx

Add to Reading List

Source URL: courses.ttu.edu

Language: English - Date: 2010-01-11 00:02:34
18Signal processing / Electronics / Electronic circuits / Electrical engineering / Control theory / Signal / Digital-to-analog converter / Analog signal processing / Digital signal processing / Electromagnetism / Electronic engineering

6.1.1 Which of the following are signal processing systems (we shall use x for inputs and y for outputs)? Explain. 1. The identity y = x This is obviously a signal processing system. If x is a signal, then y will necessa

Add to Reading List

Source URL: www.dspcsp.com

Language: English - Date: 2003-05-12 02:21:55
UPDATE