and Security Technologies

Results: 1110



#Item
611Formal methods / Mathematics / Diagrams / Specification and Description Language / Invariant / Finite-state machine / Extended finite-state machine / Vulnerability / Buffer overflow / Computing / Models of computation / Theoretical computer science

Abstracting Security Specifications in Building Survivable Systems J. Jenny Li and Mark Segal Telcordia Technologies (formerly Bellcore) 445 South Street, Morristown NJ[removed]USA Email: [removed]; Phone: (97

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
612Email authentication / Internet privacy / Key management / Kerberos / Message authentication code / Password / S/MIME / Digital signature / Cryptographic hash function / Cryptography / Computer security / Public-key cryptography

Young, A., Kirstein, P. and Ibbetson, A[removed]Technologies to Support Authentication in Higher Education : A Study for the UK Joint Information Systems Committee, August 21th, 1996. Other. UKOLN, University of Bath, Ba

Add to Reading List

Source URL: opus.bath.ac.uk

Language: English - Date: 2014-12-16 19:39:40
613Mineral exploration / Geology / Minerals / United States Bureau of Mines / Science / Economic geology / Mining engineering / Mining

MINERALS: AMERICA’S STRENGTH Minerals provide the foundation for the American way of life. They inspire the innovation of new technologies, feed U.S. manufacturing and are vital to our national security. Minerals are p

Add to Reading List

Source URL: nma.org

Language: English - Date: 2014-02-20 14:05:10
614Electronic commerce / Cryptographic protocols / Computer network security / Entrust / Public key infrastructure / X.509 / Verisign / Digital signature / Cryptography / Public-key cryptography / Key management

PKI – The Gap Between Products and Standards Panel Proposal Panel Chair: Santosh Chokani, CygnaCom Solutions Panelists: Sharon Boeyen, Entrust Patrick Cain, BBN Technologies

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
615Palantir Technologies / Privacy Office of the U.S. Department of Homeland Security / United States Citizenship and Immigration Services / Emergency management / Freedom of information legislation / Federal Emergency Management Agency / Public records / United States Department of Homeland Security / Public safety / Government

Case 1:11-cv[removed]JDB Document 12 Filed[removed]Page 1 of 3 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA ___________________________________________ ELECTRONIC PRIVACY INFORMATION

Add to Reading List

Source URL: epic.org

Language: English - Date: 2014-10-17 13:12:10
616Zoology / Seafood / Crayfish / Aquaculture / Fish / Procambarus clarkii / Applied Food Technologies / Fish products / Food and drink / Fishing industry

CHINESE SEAFOOD: SAFETY AND TRADE ISSUES HEARING BEFORE THE U.S.-CHINA ECONOMIC AND SECURITY

Add to Reading List

Source URL: seafood.oregonstate.edu

Language: English - Date: 2013-09-03 14:01:05
617National security / Computer network security / Data security / Public safety / International Multilateral Partnership Against Cyber Threats / Information security / National Institute of Standards and Technology / Security controls / Identity management / Security / Computer security / Crime prevention

CA TECHNOLOGIES | Business rewritten by software Experience with the Framework for Improving Critical Infrastructure Cybersecurity Prepared for:

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-10 21:19:31
618Applied ethics / Research / Belmont Report / Institutional review board / Declaration of Helsinki / Human subject research / Informed consent / Information and communication technologies in education / National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research / Ethics / Medical ethics / Clinical research

Applying Ethical Principles to Information and Communication Technology Research: A Companion to the Department of Homeland Security Menlo Report January 3, [removed]

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2012-10-16 11:49:25
619Electric power distribution / Electric power transmission systems / Emerging technologies / Smart grid / Smart meter / Electrical grid / Demand response / Automatic meter reading / Distributed generation / Electric power / Energy / Electromagnetism

Smart Grid Task Force[removed]Expert Group 2: Regulatory Recommendations for Privacy, Data Protection and Cyber-Security in the Smart Grid Environment Data Protection Impact Assessment

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2014-10-20 10:13:57
620Human enhancement / Time / Technology / Future / Nanotechnology / Emerging technologies / Impact of nanotechnology

Safety and Security Procedures

Add to Reading List

Source URL: www.nisenet.org

Language: English - Date: 2014-05-01 14:37:25
UPDATE