Access control

Results: 10445



#Item
91Computing / Data / Information technology / Computer access control / Data management / Access control / Records management / Metadata / Attribute / XACML / PERMIS / Authentication

Draft NISTIR 8112, Attribute Metadata

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-08-01 15:13:29
92Security / Prevention / Safety / Identity management / Cryptography / Computer security / National security / Password / Access control / Information security / Identity management system / Su

PDF Document

Add to Reading List

Source URL: its.sjsu.edu

Language: English - Date: 2015-12-07 11:37:15
93Computing / Computer access control / Security / Microsoft / Form / Login / Email / Password / Computer security / Registered user / Outlook.com

BVP Account Creation Checklist

Add to Reading List

Source URL: ojp.gov

Language: English - Date: 2016-03-04 16:05:26
94Security / Computer security / Access control / Computer access control / Identity management / XACML / Authorization / Privacy / Information visualization / Internet privacy / Situation awareness

Information Visualization for Rule-based Resource Access Control Jaime Montemayor, Andrew Freeman, John Gersh, Thomas Llanso, Dennis Patrone The Johns Hopkins University Applied Physics LaboratoryJohns Hopkins Roa

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-06-02 15:04:21
95Security / Computer security / Cybercrime / Computer access control / Point and click / Login / Click

How to Login to Faculty Web Go to the Graduate Center Home Page: www.gc.cuny.edu and click on the Portal link Click here Click on the Self Service Banner link to access the login page:

Add to Reading List

Source URL: www.gc.cuny.edu

Language: English - Date: 2014-12-03 11:02:15
96Computer security / Software / Computing / Computer access control / Xerox DocuShare / Access control / Group / Document collaboration / Access control list / Shared resource / File system permissions / Outlook.com

How Users Use Access Control D. K. Smetters Nathan Good PARC

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2009-05-30 23:35:56
97Computing / Network architecture / Ethernet / IEEE standards / Networking hardware / IEEE 802.11 / IEEE 802.3 / Media access control / Gigabit Ethernet / Received signal strength indication / Ethernet over twisted pair / Power over Ethernet

I N T U I C O M 802.11a 5GHz BROADBAND SOLUTIONS N I T R O

Add to Reading List

Source URL: www.econolite.com

Language: English - Date: 2016-02-19 05:24:26
98Evaluation / Computer access control / Directory service / Publishing / Validation / Business

TelePath Directory Distribution System Distribution Tracking & Verification TelePath—Overview Easily Track and Verify Your

Add to Reading List

Source URL: www.yellowmagic.com

Language: English - Date: 2010-08-31 14:53:24
99Identity management / Computer access control / Identity / Privacy / Computing / Digital rights / Human rights / Law / Kantara Initiative / Internet privacy / Internet Governance Forum / User-Managed Access

ITAC SPEAKING NOTES FOR THE OCED PRIVACY CONFERENCE IN ISRAELOCTOBER 2010 PANEL IV – FOSTERING INNOVATION IN PRIVACY PROTECTION “This session will examine some innovative approaches being taken by organisation

Add to Reading List

Source URL: www.internetac.org

Language: English - Date: 2014-04-23 18:14:13
100Computing / Directory services / Computer access control / Software / Computer security / Internet Standards / Internet protocols / Access control / Lightweight Directory Access Protocol / Authentication / Security Support Provider Interface / Password

PDF Document

Add to Reading List

Source URL: www.inforouter.com

Language: English - Date: 2015-03-26 12:13:27
UPDATE