Access control

Results: 10445



#Item
291Computer access control / Access control / Authorization

Authorization to Release Medical Information I authorize: _____________________________________ Name of Facility Sending Information __________________________

Add to Reading List

Source URL: www.bridgeshealingcenters.com

Language: English - Date: 2014-05-01 11:06:32
292Computer access control / Identity management / Federated identity / Identity / Cloud standards / Open Identity Exchange / Government Digital Service / Identity assurance / Identity Cards Act / Digital identity / Identity document / National identity card

CREATING A DIGITAL IDENTITY IN JERSEY (LEVERAGING THE EXPERIENCE OF THE UK IDENTITY ASSURANCE PROGRAMME) The findings of a Discovery Project By Rob Laurence (Innovate Identity)

Add to Reading List

Source URL: oixuk.org

Language: English - Date: 2016-06-01 05:08:24
293Software / Computer access control / Password / Security / Prevention / ANI / Cursor / Icon / Point and click / Draw a Secret / Pointer

A Random Cursor Matrix to Hide Graphical Password Input Alice Boit Thomas Geimer Hochschule Bremen (University of Applied Sciences) J¨orn Loviscach∗

Add to Reading List

Source URL: www.j3l7h.de

Language: English - Date: 2009-08-23 13:49:42
294Web accessibility / Assistive technology / Disability / Educational technology / Shall and will / Linguistics / Radiation Control for Health and Safety Act

Section 508 Evaluation Template

Add to Reading List

Source URL: access.sdsu.edu

Language: English - Date: 2015-09-21 17:45:17
295Computing / Microsoft / Ls / Email / Role-based access control / Zip / Counterpoint / Outlook.com

COUNTERPOINT/SOFT  SKULL  PERMISSIONS  REQUEST  FORM     If  you  are  using  an  excerpt  or  selection  from  one  of  our  books  you  must  secure  w

Add to Reading List

Source URL: www.counterpointpress.com

Language: English - Date: 2015-10-09 13:23:09
296Computer access control / Computer security / Security / Authentication / Login / User / Password

Notice 3 Dear Students, If your quota has been exceeded please use this temporary credentials as per the below username :cstd Password :Gust@#2016 ----------------------

Add to Reading List

Source URL: courseweb.sliit.lk

Language: English - Date: 2016-08-12 02:51:55
297Computer access control / Cryptography / Computer security / Security / Access control / Usability / Authentication / Notary / Packaging / Implicit authentication / Password

Usability and Security Perceptions of Implicit Authentication: Convenient, Secure, Sometimes Annoying Hassan Khan, Urs Hengartner, and Daniel Vogel Cheriton School of Computer Science University of Waterloo Waterloo, ON

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-02-21 12:56:58
298Computer access control / Computer security / Computing / Identity management / Federated identity / Metadata standards / Security Assertion Markup Language / SAML 2.0 / Shibboleth / XACML / OpenID / OAuth

Milestone MJRA1.3: Design for the integration of an Attribute Management Tool

Add to Reading List

Source URL: aarc-project.eu

Language: English - Date: 2016-07-21 05:59:16
299Economy / Finance / Money / Notary / Financial services / Access control / Authentication / Computer access control / Packaging / Pension / PrivatBank

PreStar ™ Your Liberty foundation for vested benefit solution in collaboration with Lienhardt & Partner Privatbank Zürich AG

Add to Reading List

Source URL: docs.liberty-vorsorge.ch

Language: English - Date: 2016-01-18 09:19:51
300Microsoft / Computer access control / Software / Password / Security / Outlook.com / Self-service password reset

ECIAAA ClientTracker SECTION 300

Add to Reading List

Source URL: www.eciaaa.org

Language: English - Date: 2015-08-31 15:18:33
UPDATE