Access Authentication

Results: 2034



#Item
911Access control / Actuarial science / Data security / Computer security / Authentication / Notary / Risk / Electronic business / Risk-based authentication / Security / Public safety / Management

7_implement_e_auth_system_1_eng

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2013-01-28 04:23:20
912Crime prevention / Computer security / Access control / Physical security / Information security / Radio-frequency identification / Authentication / Identity management / Wireless security / Security / Public safety / National security

Key Technologies Coordinated Implementation of Facilities and Information Security Systems HAYANO Shin-ichiro, TANIKAWA Tadashi, KITAKAZE Jiro

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2013-10-01 21:33:47
913Certificate policy / Public key certificate / Public key infrastructure / X.509 / Certificate authority / Accreditation / Entrust / Authentication / Revocation list / Cryptography / Public-key cryptography / Key management

Identity and Access Management Glossary

Add to Reading List

Source URL: www.finance.gov.au

Language: English - Date: 2014-12-18 00:47:25
914Certificate policy / Public key infrastructure / Identity management / Authentication / Information security / Public key certificate / Information assurance / Revocation list / Digital signature / Cryptography / Key management / Public-key cryptography

Identity and Access Management Glossary V1.0 | DECEMBER 2014 Identity and Access Management

Add to Reading List

Source URL: www.finance.gov.au

Language: English - Date: 2014-12-18 00:47:24
915Authentication / Notary / Packaging / Authenticity in art / Cryptographic protocols / Security / Cryptography / Access control

This is a post-refereeing final draft. When citing, please refer to the published version: Cohen, E. and Cohen, S.A[removed]Authentication: Hot and Cool. Annals of Tourism Research, 39(3), [removed]DOI: [removed]j.anna

Add to Reading List

Source URL: epubs.surrey.ac.uk

Language: English - Date: 2013-09-23 15:28:16
916Access control / Relational database management systems / Authentication / Notary / Packaging / Database security / Database audit / Oracle Database / Information security / Security / Computer security / Computing

Oracle Database Security Guide 10g Release[removed]Part No. B10773-01 December 2003

Add to Reading List

Source URL: docs.oracle.com

Language: English - Date: 2004-07-27 11:23:00
917Information technology management / Dow Jones Industrial Average / IBM / IBM Tivoli Storage Productivity Center / IBM Tivoli Workload Scheduler / System software / Computing / Identity management systems

Configuring Strong Authentication with IBM Tivoli Access Manager for Enterprise Single Sign-On

Add to Reading List

Source URL: www.redbooks.ibm.com

Language: English - Date: 2011-12-15 21:20:42
918Computer network security / Internet protocols / Internet standards / Directory services / Password / Lightweight Directory Access Protocol / Integrated Windows Authentication / Single sign-on / Security token / Computer security / Computing / Software

Siebel Security Guide Siebel Innovation Pack 2013 Version[removed]September 2013 Copyright © 2005, 2013 Oracle and/or its affiliates. All rights reserved.

Add to Reading List

Source URL: docs.oracle.com

Language: English - Date: 2013-09-13 05:03:24
919Internet standards / Directory services / Computer network security / Security / Lightweight Directory Access Protocol / Password / Siebel Systems / Integrated Windows Authentication / Single sign-on / Computing / Computer security / Internet protocols

Security Guide for Siebel Business Applications

Add to Reading List

Source URL: docs.oracle.com

Language: English - Date: 2012-04-18 05:17:08
920VASCO Data Security International / Access control / Authentication / Internet security / Password / Transaction authentication number / One-time password / Electronic signature / Email / Security / Computer security / Digipass

DIGIPASS DIGIPASS 560 Counter Man-in-the-Middle attacks with e-Signatures: What You See is What You Sign The DIGIPASS 560 is a strong authentication device with a built-in electronic signature functionality to help secu

Add to Reading List

Source URL: www.authstrong.com

Language: English - Date: 2009-10-30 18:42:00
UPDATE