Access token

Results: 765



#Item
161Unix / Cryptographic software / System administration / One-time password / Password / Security token / Two-factor authentication / Shadow password / Challenge-response authentication / Computer security / Security / Access control

One-Time Passwords Hal Pomeranz Deer Run Associates One-Time Passwords – Unix Security Track All material in this course Copyright © Hal Pomeranz and Deer Run Associates,

Add to Reading List

Source URL: www.deer-run.com

Language: English - Date: 2001-02-08 01:03:21
162Health informatics / Security token / Two-factor authentication / Electronic prescribing / Authentication / Biometrics / Electronic medical record / One-time password / Multi-factor authentication / Security / Health / Access control

DATA SHEET CA Technologies and BIO-key™ Solution for Secure Electronic Prescribing of Controlled Substances At a Glance

Add to Reading List

Source URL: www.bio-key.com

Language: English - Date: 2014-08-19 14:10:15
163Security / Password / Transport Layer Security / Security token / Database security / IBM Lotus Notes / Computing / Data / Internet standards

Progeny Security Features Your Data is Reliably Secure and Easy to Manage User Identification and Authentication The User ID and encrypted password control who has access to a database. LDAP Integrated Login

Add to Reading List

Source URL: www.progenygenetics.com

Language: English - Date: 2011-08-09 15:31:20
164Internet protocols / Cloud standards / OAuth / Authentication / Authorization / Identity management / Access token / SAML 2.0 / Security Assertion Markup Language / Computer security / Computing / Security

TECH 3366 THE CROSS PLATFORM AUTHENTICATION PROTOCOL VERSION 1.0

Add to Reading List

Source URL: tech.ebu.ch

Language: English - Date: 2014-10-17 00:18:29
165Password / Security token / Single sign-on / Challenge-response authentication / User / Secure Shell / Cryptographic software / Password manager / OTPW / Computer security / Security / Access control

Peer-to-Peer Single Sign-On Security Scheme for Today’s Smart Spaces? Enrique Soriano Salvador Francisco J. Ballesteros Gorka Guardiola Laboratorio de Sistemas

Add to Reading List

Source URL: lsub.org

Language: English - Date: 2014-05-08 10:53:16
166Computer network security / Federated identity / Single sign-on / Security token / Password / Kerberos / Authentication / Secure Shell / User / Security / Computer security / Access control

A P2P Single Sign-On which remains Single on Smart Spaces ? Enrique Soriano Francisco J. Ballesteros Gorka Guardiola Laboratorio de Sistemas

Add to Reading List

Source URL: lsub.org

Language: English - Date: 2014-05-08 10:42:13
167Document Type Declaration / Access token

Achieving Parsing Sanity with Neotoma Sean Cribbs Prime Motif

Add to Reading List

Source URL: www.erlang-factory.com

Language: English - Date: 2011-09-19 06:17:30
168Access token / Filesystem Hierarchy Standard / Software / Computing / System software / Daemon

Stanford University July 26, 2014 Daemons, PAGs, and Automated Authentication

Add to Reading List

Source URL: www.eyrie.org

Language: English - Date: 2014-07-26 03:56:11
169Internet protocols / Internet standards / Scripting languages / Password / Login / File Transfer Protocol / Access token / JavaScript / Computing / Internet / Network architecture

Perl versiondocumentation - Net::Netrc NAME Net::Netrc - OO interface to users netrc file SYNOPSIS

Add to Reading List

Source URL: perldoc.perl.org

Language: English - Date: 2014-10-03 14:54:05
170Computer network security / Federated identity / Identity management / Kerberos / Single sign-on / Authentication / Access token / Principal / Authorization / Security / Computer security / Access control

Accountability and Control of Process Creation in Metasystems Marty Humphrey, Frederick Knabe, Adam Ferrari, and Andrew Grimshaw Department of Computer Science University of Virginia Charlottesville, VA

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2001-09-17 13:13:14
UPDATE