<--- Back to Details
First PageDocument Content
Cryptography / Identity management systems / Identity management / Password / Single sign-on / Privileged password management / Password manager / Security / Computer security / Access control
Date: 2010-06-23 05:39:42
Cryptography
Identity management systems
Identity management
Password
Single sign-on
Privileged password management
Password manager
Security
Computer security
Access control

Microsoft Word - pap0869-inglesant.doc

Add to Reading List

Source URL: www.cl.cam.ac.uk

Download Document from Source Website

File Size: 89,75 KB

Share Document on Facebook

Similar Documents

NetAXS Web-based Access Control System Data Sheet

NetAXS Web-based Access Control System Data Sheet

DocID: 1xVj6 - View Document

Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation Philipp Holzinger∗ , Ben Hermann† , Johannes Lerch† , Eric Bodden‡ and Mira Mezini† ∗ Fraunhofer  SIT, Email: philipp.holzinger@sit

Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation Philipp Holzinger∗ , Ben Hermann† , Johannes Lerch† , Eric Bodden‡ and Mira Mezini† ∗ Fraunhofer SIT, Email: philipp.holzinger@sit

DocID: 1xUqk - View Document

Monotone Batch NP-Delegation with Applications to Access Control Zvika Brakerski∗ Yael Tauman Kalai†

Monotone Batch NP-Delegation with Applications to Access Control Zvika Brakerski∗ Yael Tauman Kalai†

DocID: 1xUdf - View Document

Extensible Access Control with Authorization Contracts Scott Moore Christos Dimoulas  Robert Bruce Findler

Extensible Access Control with Authorization Contracts Scott Moore Christos Dimoulas Robert Bruce Findler

DocID: 1xU35 - View Document

Validating SGAC Access Control Policies with Alloy and ProB Nghi Huynh, Marc Frappier, Amel Mammar and R´egine Laleau FA 2018, April 30th

Validating SGAC Access Control Policies with Alloy and ProB Nghi Huynh, Marc Frappier, Amel Mammar and R´egine Laleau FA 2018, April 30th

DocID: 1xTC8 - View Document