Access control

Results: 10445



#Item
911

c 2006 by Fariba Mahboobe Khan. All rights reserved. USING ATTRIBUTE-BASED ACCESS CONTROL TO ENABLE ATTRIBUTE-BASED MESSAGING

Add to Reading List

Source URL: seclab.illinois.edu

Language: English - Date: 2011-04-23 09:18:25
    912Economy / Prevention / Computer access control / Cryptography / Identity documents / Access control / Authentication / Notary / Packaging / Password / HSBC

    How to… Activate my new Security Device Note: Before activating your new Device, please note that it must be assigned to you by your System Administrator. If you are a System Administrator or End User and are logging o

    Add to Reading List

    Source URL: www.hsbcnet.co.uk

    Language: English - Date: 2016-05-10 15:51:44
    913Economy / Computer access control / Stock market / Finance / Access control / Authentication / Notary / Packaging / Deposit account / Security / Smart card

    WDB-eBanking-Bedingungen_GK_DE_EN.indd

    Add to Reading List

    Source URL: www.wirecardbank.com

    Language: English - Date: 2016-01-14 09:14:45
    914Internet privacy / Computing / Software / Hypertext Transfer Protocol / World Wide Web / Computer access control / HTTP cookie / Internet marketing / Information privacy / Local shared object / Behavioral targeting / Opt-out

    Cookie Policy Web Version 1.0 Cookie Policy Introduction

    Add to Reading List

    Source URL: www.iveco.com

    Language: English - Date: 2015-06-11 09:59:23
    915

    TC-010, Export/Import Controls (Page 1 of 1) April 2009 Addendum to TC-001, General Terms and Conditions of Purchase. 1. Seller shall control the disclosure of and access to technical

    Add to Reading List

    Source URL: pxi.com

    Language: English - Date: 2010-05-04 08:19:00
      916Computer access control / Cryptography / Computer security / Access control / Authentication / Notary / Packaging / Security / Authenticator / Derivative test

      Derivative Test Plan Company Name Contact Person Email address: Product / Service Name and Version:

      Add to Reading List

      Source URL: fidoalliance.org

      Language: English - Date: 2016-06-17 18:31:49
      917Computing / Internet privacy / Software / Hypertext Transfer Protocol / World Wide Web / Computer access control / HTTP cookie / Web analytics / Information privacy / Local shared object / Behavioral targeting / Opt-out

      Cookie Policy Web Version 1.0 Cookie Policy Introduction

      Add to Reading List

      Source URL: www.iveco.com

      Language: English - Date: 2015-06-11 10:00:12
      918Computer access control / Economy / Identity documents / Prevention / Financial services / Password / Security / Telephone banking / Online banking / Authentication / Bank

      Direct Banking Application Form

      Add to Reading List

      Source URL: www.crediteurope.com.mt

      Language: English - Date: 2016-06-02 03:14:06
      919Computer access control / YubiKey / HMAC-based One-time Password Algorithm / Universal 2nd Factor / Time-based One-time Password Algorithm / One-time password / LastPass / Dropbox / CCID / Gmail / Authentication / Password

      YubiKey Edge and YubiKey Edge-n • YubiKey Edge and YubiKey Edge-n offer strong authentication via Yubico one-time passwords (OTP) and FIDO Universal 2nd Factor (U2F) with a simple tap or touch of a button

      Add to Reading List

      Source URL: www.yubico.com

      Language: English - Date: 2016-02-04 14:54:46
      920Computing / Parallel computing / Computer architecture / Central processing unit / Computer hardware / Data parallelism / Cache control instruction

      Cache Refill/Access Decoupling for Vector Machines Christopher Batten, Ronny Krashinsky, Steve Gerding, Krste Asanović Computer Science and Artificial Intelligence Laboratory Massachusetts Institute of Technology

      Add to Reading List

      Source URL: www.lcs.mit.edu

      Language: English - Date: 2004-11-20 00:25:45
      UPDATE