Access Authentication

Results: 2034



#Item
521Computing / Integrated Windows Authentication / Kerberos / SPNEGO / NTLM / Active Directory / Access token / Password / Authentication / Microsoft Windows / Computer security / Computer network security

PDF Document

Add to Reading List

Source URL: www.javasystemsolutions.com

Language: English - Date: 2011-09-13 15:51:45
522Directory services / Java platform / Java enterprise platform / Lightweight Directory Access Protocol / Apache ActiveMQ / Java Authentication and Authorization Service / Password / Streaming Text Oriented Messaging Protocol / Computing / Internet protocols / Message-oriented middleware

PDF Document

Add to Reading List

Source URL: labs.mwrinfosecurity.com

Language: English - Date: 2015-05-22 06:07:59
523Surveillance / Access control / Keystroke dynamics / Password / Authentication / Password manager / Biometrics Institute / Security / Biometrics / Cryptography

Enhancing the Password Security with Keystroke Dynamics Christophe Rosenberger GREYC Research Lab - France

Add to Reading List

Source URL: passwords12.at.ifi.uio.no

Language: English - Date: 2012-12-07 01:43:00
524Identity management / Data security / Clarksburg /  West Virginia / Criminal Justice Information Services Division / Information security / Authorization / Security token / Single sign-on / Authentication / Security / Computer security / Access control

PDF Document

Add to Reading List

Source URL: www.ca.com

Language: English - Date: 2014-11-11 11:13:52
525GoToMyPC / Software / GoToAssist / GoToMeeting / Gototraining / Citrix Systems / GoToMyPC Pro / Remote access / Two-factor authentication / Remote desktop / Remote administration software / Computing

Citrix_GoToMeeting_2014_Logo2

Add to Reading List

Source URL: www.gotomypc.com

Language: English - Date: 2014-10-30 16:41:11
526Trusted computing / Password / Public-key cryptography / Trusted Execution Technology / Information security / Access control / Disk encryption / Two-factor authentication / Security / Cryptography / Computer security

bloc marque driving trust cmjn

Add to Reading List

Source URL: www.insidesecure.com

Language: English
527Surveillance / Access control / Automatic identification and data capture / Facial recognition system / Authentication / Iris recognition / Face detection / Password / Three-dimensional face recognition / Security / Biometrics / Face recognition

PDF Document

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:26
528Key management / Access control / Public-key cryptography / Identity management / Authorization / Authentication / XACML / X.509 / Trust management / Cryptography / Security / Computer security

Authorization in Trust Management: Features and Foundations PETER C. CHAPIN, CHRISTIAN SKALKA, and X. SEAN WANG University of Vermont Trust management systems are frameworks for authorization in modern distributed system

Add to Reading List

Source URL: web.vtc.edu

Language: English - Date: 2013-05-09 09:08:56
529Network protocols / Internet standards / Wireless networking / Electric power / Channel access method / Media Access Control / Power line communication / Smart grid / Telecommunication / Technology / Computing / Electronic engineering

MA Armature current limiters 435 ASIA (authentication, session invocation, authorization) 448–452 proxy mode 450–451

Add to Reading List

Source URL: media.wiley.com

Language: English - Date: 2013-08-28 16:19:36
530User interface techniques / Access control / Authentication / Notary / Packaging / Mobile banking / Interactive voice response / Two-factor authentication / Anakam / Security / Technology / Electronic commerce

PDF Document

Add to Reading List

Source URL: www.easysol.net

Language: English - Date: 2014-12-19 10:55:29
UPDATE