Access token

Results: 765



#Item
721Markup languages / Query languages / Technical communication / Security token / SQL / Access token / Tree traversal / XPath / Search engine indexing / Computing / Information science / XML

Client-Based Access Control Management for XML documents

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2006-07-29 01:29:18
722Internet protocols / Federated identity / Computer crimes / Security token / Two-factor authentication / Single sign-on / Password / Keystroke logging / Authentication / Security / Computer security / Access control

ProtectID_White_Paper_4 _2_

Add to Reading List

Source URL: www.strikeforcetech.com

Language: English - Date: 2011-02-10 11:55:06
723Computer network security / Smart cards / Identity / Computer security / Gemalto / Identity management / Security token / Authentication / Digital rights management / Security / Cryptography / Access control

Microsoft Word - TAB template Neville Pattinson.doc

Add to Reading List

Source URL: cyber.law.harvard.edu

Language: English - Date: 2008-09-16 10:16:57
724System administration / Unix / Password / Pass the hash / Privilege / Superuser / Access token / Principle of least privilege / QVD / Computer security / Microsoft Windows / System software

Control Administrative Privileges Administrative privileges on a computer system allow access to resources that are unavailable to most users and permit the execution of actions that would otherwise be restricted. When s

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2014-03-13 11:45:53
725Password / PKCS / Access token / RSA / Two-factor authentication / Security token / Cryptography / Public-key cryptography / Cryptography standards

Entegrity PKCS#11 Workbench Description Version 1.4 – 9 Oct 2000 Overview The Entegrity PKCS#11 Workbench is a C/C++ program. Source is provided. The workbench has

Add to Reading List

Source URL: www.storage.jak-stik.ac.id

Language: English - Date: 2000-11-30 12:00:00
726Ticket / Access token / Tickets / Railway signalling / Token

☞ Please “Try” to give us a Week advance notice to Cancel, (Accepted up *T T H U R S D A Y Night prior to the Weekend .) 3 Cancellations count as one outing. (Non-Members 2)

Add to Reading List

Source URL: www.astrollinthepark.com

Language: English - Date: 2013-05-03 15:36:35
727McAfee / Cryptography / Security token / One-time password / Two-factor authentication / Password / Software token / Authentication / Password manager / Security / Computer security / Access control

Case Study Cloudalize Customer profile Cloud services provider based in Belgium

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:46:41
728McAfee / Two-factor authentication / One-time password / Password / Security token / Authentication / Password manager / Security / Computer security / Access control

Case Study AceIQ Customer profile Swedish IT consulting firm Industry

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:46:33
729Biometrics / Two-factor authentication / Authentication / Security token / Keystroke dynamics / Risk-based authentication / Password authentication protocol / Password / Information security / Security / Cryptography / Access control

Alternative authentication – what does it really provide? Steve Pannifer Consult Hyperion Tweed House 12 The Mount

Add to Reading List

Source URL: www.chyp.com

Language: English - Date: 2013-12-13 13:58:42
730Internet protocols / Collaborative software / HTTP / WebDAV / Privilege / Access control / DAV / URI scheme / Access token / Computing / Computer security / Security

Network Working Group Request for Comments: 3744 Category: Standards Track G. Clemm IBM

Add to Reading List

Source URL: webdav.org

Language: English - Date: 2007-07-22 15:16:43
UPDATE