Access Authentication

Results: 2034



#Item
421Computer network security / Information security / Security controls / Vulnerability / Threat / Authentication / Attack / Access control / Authorization / Security / Computer security / Cyberwarfare

National Risk Management Policy and Framework for National Security Systems

Add to Reading List

Source URL: www.ncsc.gov

Language: English - Date: 2012-05-15 07:38:22
422FOAF / Role-based access control / Distributed Access Control System / Lattice-based access control / Password / Semantic Web / PERMIS / Authentication / Security / Access control / Computer security

R O L E A N D L O C AT I O N B A S E D A C C E S S C O N T R O L USING SEMANTIC WEB TECHNOLOGIES sandro cirulli student number: supervisor: professor david duce module: p00998 - msc dissertation

Add to Reading List

Source URL: sandrocirulli.net

Language: English - Date: 2015-05-17 14:55:32
423Computer security / Clinical pharmacology / Medical prescription / Patient safety / Pharmacology / Authentication / Password / Email / Internet security / Computer network security / Security / Computing

Step by Step Instructions for Account Set-Up and Access to the Prescription Monitoring Program Through Secure Access Washington

Add to Reading List

Source URL: www.doh.wa.gov

Language: English - Date: 2015-04-22 17:11:55
424Law / Access control / Authentication / Packaging / Travel document / Document / Security / Civil law / Notary

TRAVEL DOCUMENT SYSTEMS, INC Document Authentication Request Acct # (Optional)

Add to Reading List

Source URL: www.traveldocs.com

Language: English - Date: 2015-04-20 14:30:28
425Computer crimes / Cryptography / Identity management / Password / Phishing / One-time password / Single sign-on / Challenge-response authentication / Keystroke logging / Security / Computer security / Access control

Proc. WWW 2007, Banff, BC A Large-Scale Study of Web Password Habits Dinei Florencio

Add to Reading List

Source URL: cyberside.planet.ee

Language: English - Date: 2013-11-03 21:52:06
426Computer network security / Password / Authentication / Biometrics / Two-factor authentication / Security token / Security / Computer security / Access control

INDISTINGUISHABLE FROM MAGIC Is Secure and Usable Smartphone Authentication Asking Too Much?

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2015-05-18 18:23:42
427Crime prevention / Computer security / Computer network security / Information security / Security engineering / Physical security / Authentication / Access control / Vulnerability / Security / Public safety / National security

CHAPTER 1 What Is Security Engineering? Out of the crooked timber of humanity, no straight thing was ever made.

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:22:27
428Cryptographic protocols / HTTP / Password / Challenge-response authentication / Two-factor authentication / Security token / Digest access authentication / Cryptographic nonce / Authentication / Security / Cryptography / Computer security

CHAPTER 3 Protocols It is impossible to foresee the consequences of being clever.

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:22:54
429Notary / Internet protocols / Access control / Authentication / Public key certificate / Password authentication protocol / Cryptography / Key management / Public-key cryptography

Online Certification/Authentication of Documents re: Business Entities – 201–April–05 Topic: Online Certification/Authentication of Documents re: Business Entities

Add to Reading List

Source URL: www.iaca.org

Language: English - Date: 2013-02-07 21:37:40
430Identity / Crimes / Identity theft / Theft / Authentication / Smart card / Identity document / Biometrics / Identity Cards Act / Security / Identity management / Access control

CTO Corner May 2015 Identity Proofing and Authentication Dan Schutzer, Senior Technology Consultant, BITS This CTO Corner discusses current identity proofing and user authentication processes, reviews current

Add to Reading List

Source URL: www.bits.org

Language: English - Date: 2015-04-28 09:02:52
UPDATE