Access token

Results: 765



#Item
401Computer network security / Authentication / Notary / Packaging / Identity management / Password / Security token / Authorization / Smart card / Security / Computer security / Access control

AUTHENTICATION AND ACCESS: The challenge of providing access to the right individual I. OVERVIEW Once a decision has been made that the individual should be provided access to information about them maintained by a busin

Add to Reading List

Source URL: govinfo.library.unt.edu

Language: English - Date: 2004-03-10 17:12:48
402Multi-factor authentication / Two-factor authentication / Security token / Authentication / Password / One-time password / Mutual authentication / Online banking / Information security / Security / Access control / Computer security

Federal Financial Institutions Examination Council[removed]Fairfax Drive • Room 3086 • Arlington, VA[removed] • ([removed] • FAX[removed] • http://www.ffiec.gov Authentication in an Internet Banking E

Add to Reading List

Source URL: www.occ.gov

Language: English - Date: 2014-12-01 16:42:42
403Information security / Remote access / Access token / Access control / Email / Virtual private network / Computer security / Security / Computing

Rutland Regional Health Services

Add to Reading List

Source URL: www.rrmc.org

Language: English - Date: 2013-12-19 17:09:00
404Access control / Identity management / Security Assertion Markup Language / Security token / OpenID / Authenticator / Authentication / Single sign-on / Security / Computer security / Federated identity

UAF Architectural Overview

Add to Reading List

Source URL: fidoalliance.org

Language: English - Date: 2014-02-10 21:58:51
405Desktop publishing software / Digital typography / Donald Knuth / TeX / Typesetting / Tokenization / Lexical analysis / C preprocessor / Access token / Computing / Software / Macro programming languages

dowith.sty — Apply Command to Each Item in a List of Arguments in “TEX’s Gullet”∗ Uwe L¨ uck†

Add to Reading List

Source URL: ctan.ijs.si

Language: English - Date: 2012-11-27 14:26:02
406Fog Investigation and Dispersal Operation / Two-factor authentication / Authentication / Security token / Fido / Security / Access control / Authenticator

UAF Authenticator Commands

Add to Reading List

Source URL: fidoalliance.org

Language: English - Date: 2014-02-10 21:58:49
407Security / Computing / Information / Metadata / Open Archives Initiative Protocol for Metadata Harvesting / Open access / Access token / Authentication / User / Archival science / Digital libraries / Internet protocols

Requester Information Name: E-Mail: Position:

Add to Reading List

Source URL: www.ands.org.au

Language: English - Date: 2011-09-25 21:47:49
408OAuth / Computer security / Security / Federated identity / Access token / OpenID / .tel / Identity management / Social login / Cloud standards / Computing / Internet protocols

Microsoft Word - OAuth-4.docx

Add to Reading List

Source URL: dev.telnic.org

Language: English - Date: 2014-09-26 07:17:27
409Security / Federated identity / OpenID / Security Assertion Markup Language / Authentication / Security token / Information Card / Identity provider / Identity assurance / Computer security / Identity / Identity management

Federal CIO Council Information Security and Identity Management Committee Identity, Credential, and Access Management FICAM Ecosystem

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-06-10 09:16:54
410Data security / Data privacy / Health Insurance Portability and Accountability Act / Privacy law / Authentication / Information security / Access token / Password / Security / Computer security / Law

Information Technology Services Effective Date: [removed]Revised Date: 2/2007; [removed], [removed]; [removed], [removed]Workforce Remote Access

Add to Reading List

Source URL: www.unmc.edu

Language: English - Date: 2013-04-12 15:44:12
UPDATE