Access control

Results: 10445



#Item
831Query languages / Markup languages / Functional languages / XPath / XML tree / XQuery / XSLT / XACML / XML schema / Node / EXist / O:XML

Specifying Access Control Policies for XML Documents with XPath Irini Fundulaki Maarten Marx∗

Add to Reading List

Source URL: users.ics.forth.gr

Language: English - Date: 2010-09-29 11:45:00
832Internet privacy / Privacy / Computer access control / HTTP cookie / Hypertext Transfer Protocol / Information privacy / Personally identifiable information / Directive on Privacy and Electronic Communications / Zombie cookie

Microsoft Word - PRIVACY SF.docx

Add to Reading List

Source URL: www.ruinartnetwork.com

Language: English - Date: 2016-02-24 11:31:23
833Webmail / Computer access control / Password / Security / Outlook.com / Email / Login / Anti-spam techniques / Macintosh User Groups

How do I sign up? In order to sign up for a free account, you must have a valid email address. 1. Using your preferred

Add to Reading List

Source URL: dowasco.dm

Language: English - Date: 2015-07-02 08:57:55
834Computer access control / Federated identity / Security token / Identity management / Single sign-on / Imprivata / Smart card / Authentication / Password / Multi-factor authentication / Password manager

SafeSign Identity Client & Imprivata Strong authentication and Single Sign On OneSign Single Sign On (SSO) Password security and access

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:48:28
835Ethernet / IEEE standards / Networking hardware / IEEE 802.3 / Media access control / IEEE 802.11 / Gigabit Ethernet / Power over Ethernet / Ethernet over twisted pair / Received signal strength indication / Channel bonding / Institute of Electrical and Electronics Engineers

I N T U I C O M 802.11n 5GHz BROADBAND SOLUTIONS N I T R O

Add to Reading List

Source URL: www.econolite.com

Language: English - Date: 2016-02-19 05:24:27
836Remote desktop / Computer access control / Citrix Systems / XenApp / Smart card / Multi-factor authentication / Security token / Password manager / Single sign-on / Card reader / Authentication / Access token

SafeSign Identity Client & Citrix Smart card logon for Citrix XenApp Citrix XenApp Business Challenge

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:48:27
837Cyberwarfare / Trojan horses / Spyware / Computer access control / Surveillance / Hacking Team / Exploit / Citizen Lab / Vupen / Morgan Marquis-Boire / FinFisher / Proxy server

The Citizen Lab Research Brief FebruaryMapping Hacking Team’s “Untraceable” Spyware

Add to Reading List

Source URL: citizenlab.org

Language: English - Date: 2015-03-18 14:57:35
838

Access your solar energy system anytime, anywhere. It’s a powerful advantage…the ability to see the electricity you produce and consume. To monitor and control your renewable energy system with the touch of a button

Add to Reading List

Source URL: www.outbackpower.com

- Date: 2016-05-05 14:09:49
    839Hypertext Transfer Protocol / Internet privacy / Computer access control / HTTP cookie / Web analytics / Google Analytics / Cookie / Session / Zombie cookie / Evercookie

    Policy on browser cookies Our use of cookies BNP Paribas Fortis uses on its websites, for a variety of reasons, session record-keepers known as ‘cookies’. There are two main types of cookie, which should be carefull

    Add to Reading List

    Source URL: factoring.bnpparibas.com

    Language: English - Date: 2015-09-02 05:51:25
    840Internet privacy / Hypertext Transfer Protocol / Computer access control / HTTP cookie / Session / Login / Zombie cookie / Cookie / Evercookie

    Cookies To make this site work properly, we sometimes place small data files called cookies on your device. Most big websites do this too. What are cookies? A cookie is a small text file that a website saves on your comp

    Add to Reading List

    Source URL: mainwlp.efrontcloud.com

    Language: English - Date: 2015-11-26 08:17:26
    UPDATE