Access control

Results: 10445



#Item
921Computer access control / Cryptography / Computer security / Access control / YubiKey / Authentication / Multi-factor authentication

Programming YubiKeys for Okta

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2016-04-26 12:45:09
922Computer architecture / Software / System software / Monolithic kernels / Kernel / PaX / Linux kernel / Mandatory access control / Debian / Operating system kernels

Hardened kernels for everyone Yves-Alexis Perez Kernel Recipes 2015

Add to Reading List

Source URL: perso.corsac.net

Language: English
923Computing / Computer access control / LoveFilm / OAuth / Application programming interface

LOVEFiLM API WWW::Lovefilm::API    

Add to Reading List

Source URL: miltonkeynes.pm.org

Language: English - Date: 2016-02-03 15:58:00
924Computer access control / Teleconferencing / Educational technology / Web conferencing / Authentication / Technology

DDTC May 20, 2016 Webinar: IT Modernization Project Chat with Industry! Overview IT Modernization Project team provided an open discussion and requirement gathering session. The focus of this meeting was: 

Add to Reading List

Source URL: www.pmddtc.state.gov

Language: English - Date: 2016-05-24 17:09:22
925Computing / Software / Computer architecture / Memory management / Access control / Central processing unit / Virtual memory / Subroutines / Memory protection / Kernel / Capability-based addressing / Mandatory access control

CODOMs: Protecting Software with Code-centric Memory Domains Lluís Vilanova∗†§ Muli Ben-Yehuda§ Nacho Navarro∗

Add to Reading List

Source URL: www.mulix.org

Language: English - Date: 2016-06-16 09:04:37
926Engineering / Technology / Global Positioning System / Radio resource management / Electronics / Media access control / Wireless networking / Oscillators / CdmaOne / Code division multiple access / GPS signals / Pseudorandom noise

A New Class of Precision UTC and Frequency Reference Using IS-95 CDMA Base Station Transmissions Bruce M. Penrod EndRun Technologies Abstract

Add to Reading List

Source URL: www.endruntechnologies.com

Language: English - Date: 2002-01-01 18:11:48
927Software / Computing / Technology / Computer access control / Software requirements / Strong authentication / Requirement / Facebook / Specification / Authentication / Electronic voting / E-democracy

FP7 – CAPSD-CENT D4.2 – Technical Requirements and Specification of Platform and Pilots

Add to Reading List

Source URL: 185.26.51.181

Language: English - Date: 2016-04-29 02:32:18
928

On access control, capabilities, their equivalence, and confused deputy attacks Vineet Rajani MPI-SWS Deepak Garg MPI-SWS

Add to Reading List

Source URL: www-sop.inria.fr

Language: English - Date: 2016-05-09 03:19:06
    929Computer access control / Cryptography / Computer security / Computing / YubiKey / HMAC-based One-time Password Algorithm / Universal 2nd Factor / LastPass / Time-based One-time Password Algorithm / One-time password / Password manager / CCID

    YubiKey Standard and YubiKey Nano • YubiKey Standard and YubiKey Nano offer strong authentication via Yubico one-time passwords (OTP) with a simple tap or touch of a button • Works instantly with no need to re-type p

    Add to Reading List

    Source URL: www.yubico.com

    Language: English
    930

    A Formal Framework for Reflective Database Access Control Policies ∗ Lars E. Olson, Carl A. Gunter, and P. Madhusudan

    Add to Reading List

    Source URL: seclab.illinois.edu

    Language: English - Date: 2011-03-29 12:27:26
      UPDATE