Security Policy Framework

Results: 715



#Item
381Email / Spamming / Computing / Cryptographic protocols / Yahoo! / DomainKeys Identified Mail / DMARC / Sender Policy Framework / DomainKeys / Email authentication / Spam filtering / Computer security

Elements Signage OTA NEW 2013

Add to Reading List

Source URL: otalliance.org

Language: English - Date: 2014-11-20 06:26:44
382Medical informatics / Nursing informatics / International standards / Standards organizations / EHNAC / Accreditation / Interoperability / Electronic health record / Nationwide Health Information Network / Health / Medicine / Health informatics

Collaborating to Build the Security and Trust Framework for Directed Exchange[removed] Responses to Questions for the HIT Policy Committee’s Interoperability and HIE Workgroup Governance Subgroup Hearin

Add to Reading List

Source URL: www.healthit.gov

Language: English - Date: 2014-08-22 08:58:36
383Cryptographic software / Advanced Encryption Standard / Microsoft CryptoAPI / FIPS 140 / Windows Vista / Security and safety features new to Windows Vista / CryptGenRandom / Cryptography / Cryptography standards / Computer security

Secuware Security Framework - Crypt4000 Module Security Policy[removed]Version[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2008-12-24 00:00:00
384Energy in the United States / Nuclear power stations / Energy policy / United States Department of Energy National Laboratories / International Framework for Nuclear Energy Cooperation / United States Department of Energy / Idaho National Laboratory / National Nuclear Security Administration / Economics of new nuclear power plants / Energy / Nuclear physics / Nuclear technology

DEPARTMENT OF ENERGY Since 2001, the Administration: • Strengthened America’s energy security by increasing the amount of oil stored in the Strategic Petroleum Reserve from 550 million barrels to 700 million barrels;

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2010-09-29 19:05:38
385Nuclear fuels / Nuclear reprocessing / Arms control / Energy policy / Nuclear proliferation / Nuclear fuel bank / Nuclear power / International Framework for Nuclear Energy Cooperation / Nuclear fuel / Nuclear technology / Energy / Nuclear physics

Nuclear Energy and Security in NE Asia Sharon Squassoni Senior Fellow and Director, Proliferation Prevention Program Security Challenges in Northeast Asia Washington, D.C. March 30, 2010

Add to Reading List

Source URL: csis.org

Language: English - Date: 2010-07-14 12:35:04
386Food politics / Carbon finance / United Nations Framework Convention on Climate Change / Emissions reduction / Adaptation to global warming / Reducing Emissions from Deforestation and Forest Degradation / Food and Agriculture Organization / Food security / Climate change mitigation / Forestry / Environment / Climate change policy

Summary notes from the Climate-Smart Knowledge Day 29 November 2011, Durban South Africa This knowledge day was organized by the FAO to present on-going work on climate-smart agriculture and to exchange experiences and v

Add to Reading List

Source URL: www.fao.org

Language: English
387Space law / International Space University / Outer Space Treaty / Space advocacy / Space policy / Pete Worden / European Space Agency / Framework Programmes for Research and Technological Development / Spaceflight / Space / Space debris

“The Space Security Index is one of the finest examples of a comprehensive approach to space security, and a most positive contribution by civil society on a topic of such momentous importance.” Johannes C. Landman N

Add to Reading List

Source URL: www.swfound.org

Language: English - Date: 2011-02-02 13:28:10
388Computer security / Computing / DomainKeys Identified Mail / DMARC / Sender Policy Framework / Sender ID / Phishing / DomainKeys / Vouch by Reference / Email authentication / Spam filtering / Email

Technical Brief SPF, DKIM, and DMARC Demystified The what, why, and how of email sender identity technologies Enterprise sender identity technologies—SPF, DKIM, and DMARC—when properly

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:04:18
389Emergency management / Risk / Actuarial science / Occupational safety and health / Emergency / Critical infrastructure protection / First aid / Oklahoma Emergency Management Act / Federal Emergency Management Agency / Management / Public safety / Security

5.01 – EMERGENCY PLAN PURPOSE OF EMERGENCY PLAN AND PROGRAM This Emergency Plan is built on a framework consisting of the Sault College Emergency Policy, prevailing emergency-related provincial and federal legislation,

Add to Reading List

Source URL: www.saultcollege.ca

Language: English - Date: 2012-09-18 12:09:48
390Role-based access control / PERMIS / Mandatory access control / Discretionary access control / XACML / Role hierarchy / Database management system / Multilevel security / Computer security / Security / Access control

The Policy Machine: A novel architecture and framework for access control policy specification and enforcement

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-01-23 12:29:04
UPDATE