Access Authentication

Results: 2034



#Item
271Computer access control / Computing / Computer security / Cloud standards / Federated identity / OpenID / Identity management / OAuth / FIDO Alliance / Authentication / SAML-based products and services / User-Managed Access

1) Working Group Name Enhanced Authentication Profile (EAP) for OpenID Connect 2) Purpose The purpose of this working group is to develop a security and privacy profile of the OpenID Connect specifications that enable us

Add to Reading List

Source URL: openid.net

Language: English - Date: 2016-03-06 14:14:42
272Computer security / Computer access control / Security / Cyberwarfare / Identity theft / Cybercrime / Computer network security / Internet advertising / Spyware / Password / Multi-factor authentication / Phishing

Tips on Online Security Security Practices to Safeguard Your Password You are advised to adopt the following:   

Add to Reading List

Source URL: secure.ifastpensions.com

Language: English - Date: 2014-09-25 08:27:41
273Computer access control / Federated identity / Identity management / OpenID / OAuth / Security Assertion Markup Language / Authentication / Digital identity / Identity provider / WebID / Information Card / Shibboleth

A Comparative Analysis of Identity Standards for the Internet Master Thesis Kaspar Etter

Add to Reading List

Source URL: www.digitalid.net

Language: English - Date: 2014-05-23 10:03:12
274Identity management / Computer access control / Computer security / Law / Privacy / Internet privacy / Cryptography / Authentication / Security

PRIVACY IMPACT ASSESSMENTS FOR IGOVT PROGRAMME For: The Department of Internal Affairs (NZ)

Add to Reading List

Source URL: www.realme.govt.nz

Language: English - Date: 2015-05-13 01:43:40
275Computer access control / Security token / Authentication / Token / Access token / Contract

TOKEN REQUEST FORM Diamond Bank Plc. RCCustomer Information Type of Account

Add to Reading List

Source URL: www.diamondbank.com

Language: English - Date: 2016-05-26 13:33:00
276Computer access control / Software engineering / Software requirements / Identity management / Computer security / EduGAIN / TERENA / Requirement / Authentication / GANT

  05-­10-­2015   Deliverable  DJRA1.1:   Analysis  of  user  community  and  service  

Add to Reading List

Source URL: aarc-project.eu

Language: English - Date: 2015-10-07 16:41:13
277Computer access control / Access control / Authentication / Notary / Packaging / Password

Forgery-Resistant Touch-based Authentication on Mobile Devices Neil Zhenqiang Gong Mathias Payer

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
278Computer access control / Identity management / Federated identity / Identity documents / Electronic authentication / Public administration / Multi-factor authentication / FIPS 201 / Authentication / Password / Privileged identity management / Security token

Best Practices for Privileged User PIV Authentication

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-04-21 07:36:03
279Computer access control / Authentication / Secret sharing / Security token / Pico / Wi-Fi / Server / Password

To Have and Have Not: Variations on Secret Sharing to Model User Presence Quentin Stafford-Fraser University of Cambridge Computer Lab

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-07-05 13:33:42
280Cryptography / Key management / Public key infrastructure / Reputation management / Identity management / Computer access control / Web of trust / Authentication / Trust / Public key certificate / Blockchain / Internet privacy

Rebranding the Web of Trust A White Paper from Rebooting the Web of Trust by Shannon Appelcline, Dave Crocker, Randall Farmer, and Justin Newton

Add to Reading List

Source URL: www.weboftrust.info

Language: English - Date: 2016-06-08 16:57:37
UPDATE