Access control

Results: 10445



#Item
951Identity management / Computer access control / Computer security / Law / Privacy / Internet privacy / Cryptography / Authentication / Security

PRIVACY IMPACT ASSESSMENTS FOR IGOVT PROGRAMME For: The Department of Internal Affairs (NZ)

Add to Reading List

Source URL: www.realme.govt.nz

Language: English - Date: 2015-05-13 01:43:40
952

DRAFT Special PublicationRevision 1, A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-12-28 17:42:57
    953

    Physio-Control to Acquire HeartSine® Leading AED Manufacturers Unite to Offer Broad Range of Lifesaving Public Access Defibrillation Products (14 September 2015 – Redmond, WA) Physio-Control has reached an agreement w

    Add to Reading List

    Source URL: www.physio-control.com

    Language: English - Date: 2015-09-14 11:49:15
      954Computer access control / Security token / Authentication / Token / Access token / Contract

      TOKEN REQUEST FORM Diamond Bank Plc. RCCustomer Information Type of Account

      Add to Reading List

      Source URL: www.diamondbank.com

      Language: English - Date: 2016-05-26 13:33:00
      955Computer access control / Software engineering / Software requirements / Identity management / Computer security / EduGAIN / TERENA / Requirement / Authentication / GANT

        05-­10-­2015   Deliverable  DJRA1.1:   Analysis  of  user  community  and  service  

      Add to Reading List

      Source URL: aarc-project.eu

      Language: English - Date: 2015-10-07 16:41:13
      956Computer access control / Access control / Authentication / Notary / Packaging / Password

      Forgery-Resistant Touch-based Authentication on Mobile Devices Neil Zhenqiang Gong Mathias Payer

      Add to Reading List

      Source URL: hexhive.github.io

      Language: English - Date: 2016-06-13 11:08:40
      957Computer access control / Identity management / Federated identity / Identity documents / Electronic authentication / Public administration / Multi-factor authentication / FIPS 201 / Authentication / Password / Privileged identity management / Security token

      Best Practices for Privileged User PIV Authentication

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2016-04-21 07:36:03
      958Computer access control / Authentication / Secret sharing / Security token / Pico / Wi-Fi / Server / Password

      To Have and Have Not: Variations on Secret Sharing to Model User Presence Quentin Stafford-Fraser University of Cambridge Computer Lab

      Add to Reading List

      Source URL: www.cl.cam.ac.uk

      Language: English - Date: 2014-07-05 13:33:42
      959

      A Medical Database Case Study for Reflective Database Access Control ∗ Lars E. Olson, Carl A. Gunter

      Add to Reading List

      Source URL: seclab.illinois.edu

      Language: English - Date: 2011-03-29 12:09:26
        960Security / Computing / Information technology management / Configuration management / Network architecture / Software-defined networking / Routing / Access control / Firewall

        Safe and Flexible Controller Upgrades for SDNs Karla Saur Joseph Collard

        Add to Reading List

        Source URL: vanbever.eu

        Language: English - Date: 2016-02-21 06:07:19
        UPDATE