Access control

Results: 10445



#Item
351Cryptography / Computer access control / Certificate authority / Security token / Man-in-the-browser / Multi-factor authentication / Smart card / Authentication / IdenTrust

IdenTrustâ„¢ Trust Gate www Tr

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2014-04-24 20:51:56
352Microsoft / Computer access control / Password / Security / Registered user / Outlook.com

REGISTRATION AGREEMENT TO VIEW RECORDS ONLINE ROBERT W. GERMAINE, HIGHLANDS COUNTY CLERK OF COURT REQUEST FORM: *Registered User Name: *E-mail Address *Address

Add to Reading List

Source URL: www.hcclerk.org

Language: English - Date: 2016-08-01 15:25:54
353Cognitive science / Artificial intelligence / Cognition / Philosophy / Game theory / Computational trust / Computer access control / Key management / Software agent / Reinforcement learning / Practical reason / Trust

Sequential Decision Making with Untrustworthy Service Providers W. T. Luke Teacy, Georgios Chalkiadakis, Alex Rogers and Nicholas R. Jennings Electronics and Computer Science,University of Southampton Southampton, SO17 1

Add to Reading List

Source URL: www.intelligence.tuc.gr

Language: English - Date: 2008-02-08 15:13:13
354Cryptography / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Computer access control / Certificate authority / Smart card / Public key certificate / Security token / Authentication / Certificate policy

eID Management The right choice for E-Private Banking Liechtensteinische Landesbank AG E-banking is an important service

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:47:38
355Computer access control / Password / Security / Email / Prevention / Safety / Federated identity

Online Grants System Tutorial Module 1 Creating a Profile and Setting Up an Organization

Add to Reading List

Source URL: www.azhumanities.org

Language: English - Date: 2015-10-12 12:33:53
356Security / Computer security / Identity management / Information technology management / Computer access control / Prevention / Access control / Provisioning / Business process management / User provisioning software / Aveksa

Fischer Identityâ„¢ Turn Identity Management into a Strategic Advantage Self-Service Portal

Add to Reading List

Source URL: www.fischerinternational.com

Language: English - Date: 2012-05-11 12:48:40
357Computer access control / Obfuscation / Prevention / Password / Security / Passwd / Identity management / Cryptographic software

March 17, 2016 MEMORANDUM FOR: GOES DCS LRGS Data Users

Add to Reading List

Source URL: dcs4.noaa.gov

Language: English - Date: 2016-03-24 15:28:31
358Computer access control / Computer security / Computing / Security Assertion Markup Language / Single sign-on / Authentication / Spotfire / HTTP cookie / Identity provider / TIBCO Software

Business Team Busy Working Talking Concept

Add to Reading List

Source URL: spotfire.tibco.com

Language: English - Date: 2016-06-30 13:53:16
359Wireless networking / Network performance / Computing / Telecommunications engineering / Media access control / Information theory / Data transmission / Packet radio / Duplex / Throughput / Exposed node problem / Transmission Control Protocol

RCTC: Rapid Concurrent Transmission Coordination in Full Duplex Wireless Networks Wenjie Zhou, Kannan Srinivasan and Prasun Sinha Department of Computer Science and Engineering The Ohio State University

Add to Reading List

Source URL: web.cse.ohio-state.edu

Language: English - Date: 2013-08-25 15:21:10
360Security / Prevention / Safety / Crime prevention / National security / Public safety / Physical security / Perimeter security / Security guard / Computer security / Access control / Identity document

Introduction to Security Awareness Briefing Office of Security @ NOAA

Add to Reading List

Source URL: www.osec.doc.gov

Language: English - Date: 2012-02-22 10:48:16
UPDATE