Access token

Results: 765



#Item
451Computer security / Electronic authentication / Authentication / Internet protocols / Password authentication protocol / Password / Biometrics / Two-factor authentication / Security token / Security / Access control / Identity management

NIST E-Authentication Guidance SP[removed]Federal PKI TWG Feb. 18, 2004 Bill Burr [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
452Identity management / Computer network security / Internet standards / Active Directory Federation Services / Windows Server / Security Assertion Markup Language / Security token / Security domain / Access token / Computing / Computer security / System software

Bridging Trust Between Enclaves Jon R. Wall Security / IA Microsoft Corporation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
453Access control / Federated identity / E-Authentication / Public administration / Authentication / Password authentication protocol / Access token / Electronic authentication / Two-factor authentication / Security / Identity management / Computer security

e-Authentication Guidance Bill Burr NIST [removed[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
454Authentication / Notary / Packaging / Electronic authentication / Password / Biometrics / Two-factor authentication / Security token / Security / Access control / Identity management

NIST E-Authentication Guidance SP[removed]Federal PKI Deployment Workshop May 19, 2004 Bill Burr [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
455Password / Two-factor authentication / Identity management systems / Authentication server / Password manager / Security token / Security / Computer security / Access control

Microsoft PowerPoint - Real User NIST July[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
456Multi-factor authentication / Two-factor authentication / Security token / Authentication / Password / One-time password / Mutual authentication / Online banking / Information security / Security / Access control / Computer security

Federal Financial Institutions Examination Council[removed]Fairfax Drive • Room 3086 • Arlington, VA[removed] • ([removed] • FAX[removed] • http://www.ffiec.gov Authentication in an Internet Banking E

Add to Reading List

Source URL: www.ots.treas.gov

Language: English - Date: 2014-11-16 13:34:47
457Identifiers / Security / National Institutes of Health / Public records / Health Insurance Portability and Accountability Act / Privacy law / Protected health information / United States National Library of Medicine / Access token / Medicine / Health / Personal life

De-identification of Address, Date, and Alphanumeric Identifiers in Narrative Clinical Reports

Add to Reading List

Source URL: www.lhncbc.nlm.nih.gov

Language: English - Date: 2014-11-19 17:42:08
458Password / Security token / Web Services Description Language / Login / Transaction authentication number / Security / Access control / Computing

MMPC Web Services Logging In Each center will be provided with a unique Center GUID. This GUID is required to be sent as a parameter for the initial login process. The GUID tells the CBU which center is requesting the lo

Add to Reading List

Source URL: www.mmpc.org

Language: English - Date: 2012-12-05 11:49:43
459Google Analytics / SQL / JavaScript / OAuth / Null / Application programming interface / Constructor / Google App Engine / Access token / Computing / Software engineering / Web analytics

Package ‘RGoogleAnalytics’ August 16, 2014 Version[removed]Date[removed]Title R Wrapper for the Google Analytics API Author Michael Pearmain. Contributions from Nick Mihailowski,Vignesh Prajapati, Kushan Shah and Ni

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2014-08-16 11:31:14
460System software / Access token / Computer security / Windows Vista / Thread / Process / Kernel / Concurrency control / Mandatory Integrity Control / Microsoft Windows / Computing / Concurrent computing

Protected Processes - 5 Protected Processes November 27, 2006

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2006-11-30 16:47:48
UPDATE