Security Token Service

Results: 99



#Item
41Identity management / Federated identity / Cloud computing / Cloud computing security / Security token / Identity provider / Information Card / Security Token Service / Novell Cloud Security Service / Security / Computing / Computer security

Building Security In Editors: John Steven, [removed] Gunnar Peterson, [removed] Don’t Trust. And Verify A Security Architecture Stack for the Cloud

Add to Reading List

Source URL: arctecgroup.net

Language: English - Date: 2010-10-18 16:10:33
42Security token / Two-factor authentication / Single sign-on / One-time password / Authentication / Software token / RADIUS / Password / Password manager / Security / Computer security / Access control

Service platforms Authentication Solution Optimized for Smart Devices IKEYA Ryohei, OKADA Hideaki, KOUDA Keito, TEZUKA Yukiko Abstract

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2014-03-26 09:05:05
43EMC Corporation / Advanced Encryption Standard / SecurID / Personal identification number / Password / Authentication / Transaction authentication number / Access token / Identity management / Cryptography / Security / Computer security

The Secure Authentication Service Welcome Guide for RSA SecurID from Signify users www.signify.net

Add to Reading List

Source URL: www.signify.net

Language: English - Date: 2012-05-09 07:37:43
44EMC Corporation / Advanced Encryption Standard / SecurID / Two-factor authentication / Software token / Password / Access token / Identity management / Authentication / Cryptography / Security / Computer security

Token Based Authentication as a Fully Hosted Service Key benefits Reliable •

Add to Reading List

Source URL: www.signify.net

Language: English - Date: 2012-11-07 11:09:46
45Computer security / Identity management / Windows Server / Access Control Service / Windows Identity Foundation / Computing platforms / Security token / Access token / .NET Framework / Computing / System software / Security

Claims-based security for Web applications using WIF 4.5 Alex Thissen Principal Architect, Achmea

Add to Reading List

Source URL: speakerd.s3.amazonaws.com

Language: English - Date: 2015-02-01 14:16:25
46Cryptographic protocols / Internet protocols / Internet standards / Public key infrastructure / X.509 / Public key certificate / Online Certificate Status Protocol / Security token / Certificate authority / Cryptography / Public-key cryptography / Key management

the key role in digital certificate deployment PKI infrastructure at the service of public and private sector "We have significantly valued the charismathics agnostic PKI middleware platform through which we can leverage

Add to Reading List

Source URL: www.charismathics.com

Language: English - Date: 2010-10-11 12:50:19
47Two-factor authentication / SecurID / Password / Authentication / Software token / Security token / Anakam / Security / Cryptography / Computer security

Software Tokens Passcode OnDemand Tokenless Authentication as a Fully Hosted Service

Add to Reading List

Source URL: www.signify.net

Language: English - Date: 2012-11-07 11:09:46
48Password / Two-factor authentication / ICFTU Asia and Pacific Regional Organisation / National Trades Union Congress / Security token

OneKey Newsletter Issue[removed]Dear Service Providers, Here are this month’s highlights: • 600,000 NTUC Resident Members get Cyber Security and Convenience Boost with OneKey Device

Add to Reading List

Source URL: www.assurity.sg

Language: English - Date: 2014-09-15 04:57:14
49Two-factor authentication / Password / Security token / Identity theft / Cryptographic software / Password manager / Security / Access control / Computer security

OneKey Newsletter Issue[removed]Dear Service Providers, Here are this month’s highlights: • The Art of Cyber Defense (8 Jan[removed]participants attended the seminar jointly organised by Assurity and Toppan Form.

Add to Reading List

Source URL: www.assurity.sg

Language: English - Date: 2014-09-15 04:57:10
50Financial economics / Business / CIMB / Two-factor authentication / Security token / One-time password / Password / Phishing / Market data / Electronic commerce / Financial markets / Investment

OneKey Newsletter Issue[removed]Dear Service Providers, Here are this month’s highlights: • OneKey at GovWare 2013 Cyber attacks today are getting more advanced and sophisticated. Usernames and passwords are no lon

Add to Reading List

Source URL: www.assurity.sg

Language: English - Date: 2014-09-15 04:57:25
UPDATE