Access Authentication

Results: 2034



#Item
541Computer security / Transaction authentication number / Password policy / Password strength / Password / Security / Access control

Understanding and Using Your Client Web Portal Overview - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1 How do I login to the CWP? - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Add to Reading List

Source URL: cwp.morningstar.com

Language: English - Date: 2015-03-21 04:05:39
542Computing / Access control / Privacy / Radio-frequency identification / Wireless / Card reader / Smart card / Biometrics / Cisco Systems / Security / Technology / Ubiquitous computing

Unifying IP Communication SPAR Product Datasheet Secure Profile Authentication Reader Enterprise Security and Identity Management for IP-based Systems

Add to Reading List

Source URL: www.litescape.com

Language: English - Date: 2010-06-29 20:11:55
543Two-factor authentication / Usability / Authentication / Security token / Likert scale / Password / Email / Multi-factor authentication / One-time password / Security / Access control / Technology

Microsoft Word - Poster abstaract - Balancing usability and security in the business cloud authentication V3.doc

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2013-06-25 08:17:50
544Identity / Videotelephony / Authentication / Notary / Identity management / Password / Voice over IP / Smart card / Directory service / Security / Computer security / Access control

Unifying IP Communication Secure Profile Management Enterprise Security and Identity Management for IP-based Systems LiteScape Secure Profile Management™ unifies an organization’s identity management systems with IP

Add to Reading List

Source URL: www.litescape.com

Language: English - Date: 2010-06-29 20:11:55
545Identity management / Security Assertion Markup Language / Voms / PERMIS / Grid computing / Capability-based security / Authorization / Privilege Management Infrastructure / Authentication / Security / Computer security / Access control

XPOLA – An Extensible Capability-based Authorization Infrastructure for Grids Liang Fang and Dennis Gannon Computer Science Department, Indiana University, Bloomington, INFrank Siebenlist

Add to Reading List

Source URL: www.extreme.indiana.edu

Language: English - Date: 2005-06-09 17:29:36
546Surveillance / Biostatistics / Access control / Biometrics Institute / Private biometrics / Biometrics / Security / Identification

Call for Papers Special Issue on Human Detection and Recognition IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY With a very security conscious society, biometrics based authentication and identification have bec

Add to Reading List

Source URL: www.vislab.ucr.edu

Language: English - Date: 2007-04-07 18:54:05
547HTTP / Basic access authentication / Application programming interface / Representational state transfer / XML / JavaScript / Hypertext Transfer Protocol / Security Assertion Markup Language / SAML 2.0 / Computing / Technical communication / Open formats

EIDR SYSTEM VERSIONREST API REFERENCE 2015 Jan. 15 Copyright © 2011–2015 by the Entertainment ID Registry Association (EIDR). Copyrights in this work are

Add to Reading List

Source URL: eidr.org

Language: English - Date: 2015-01-16 12:18:27
548One-time password / Password / Transaction authentication number / Online banking / Interactive voice response / Bank / Electronic commerce / Password manager / Security token / Security / Access control / Computer security

Conditions for NemID business for banking, vBlocking NemID business for banking is a security solution that you can use for

Add to Reading List

Source URL: www.nemid.nu

Language: English - Date: 2015-02-07 17:01:33
549Cloud standards / OAuth / Twitter / Two-factor authentication / Meetup / Password / Access token / Authentication / Security / Computing / Technology

Mastering MEAN: Managing authentication with OAuth and Passport Scott Davis Founder ThirstyHead.com

Add to Reading List

Source URL: www.ibm.com

Language: English - Date: 2015-03-13 16:07:57
550Xinet / Web portal / Two-factor authentication / Software / System software / Computing / Password / Form

ioi toolbox access intelligent user management for Xinet portal The IOI Tools Access application is a powerful, featurerich extension to Xinet’s Admin. Access provides a secure, intuitive interface for system administr

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2013-04-26 17:24:45
UPDATE