<--- Back to Details
First PageDocument Content
Cryptography / Computer security / Computing / Computer access control / Federated identity / Access control / Computer network security / Electronic authentication / Identity management / Authentication / OpenSSH / Application security
Date: 2012-10-05 00:01:36
Cryptography
Computer security
Computing
Computer access control
Federated identity
Access control
Computer network security
Electronic authentication
Identity management
Authentication
OpenSSH
Application security

Adaptive Defenses for Commodity Software through Virtual Application Partitioning

Add to Reading List

Source URL: www.cs.columbia.edu

Download Document from Source Website

File Size: 495,30 KB

Share Document on Facebook

Similar Documents

Promoting confi dence in electronic commerce: legal issues on international use of electronic authentication and signature methods

DocID: 1tV2t - View Document

IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE 1 Tailored Reversible Watermarking Schemes for Authentication of Electronic Clinical Atlas

DocID: 1rMdy - View Document

Computer access control / Computer security / Computing / Single sign-on / Multi-factor authentication / Authentication / OAuth / Mobile app / Electronic authentication / Accounts & SSO

PROJECT DESCRIPTION MOBILE APPLICATION SINGLE SIGN-ON For Public Safety and First Responders

DocID: 1rqtN - View Document

Government / Forgery / Military-industrial complex / Defense Logistics Agency / Counterfeit / Government procurement in the United States / Economy / Business / Defense Contract Management Agency / Government Accountability Office / Authentication / Counterfeit electronic components

GAO; Counterfeit Parts: DOD Needs to Improve Reporting and Oversight to Reduce Supply Chain Risk

DocID: 1rpsj - View Document

Cryptography / Security / Computer access control / Civil law common law) / Sierre / Authentication / Electronic signature

An Electronic-signature Based Circular Resolution Database System Thomas Zefferer and Thomas Knall Institute for Applied Information Processing and Communications (IAIK)

DocID: 1roee - View Document