Computer access control

Results: 4654



#Item
211Internet privacy / World Wide Web / Computing / Software / Hypertext Transfer Protocol / Internet advertising / Computer access control / HTTP cookie / Internet marketing / Web analytics / Ghostery / DoubleClick

The Case for a General and Interaction-based Third-party Cookie Policy Istemi Ekin Akkus1, Nicholas Weaver2 1 Max

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2015-05-11 00:33:43
212Computer access control / Prevention / Password / Security / Computing / CAPTCHA / Form / Password fatigue / Transaction authentication number

PDF Document

Add to Reading List

Source URL: efiling.supremecourt.lk

Language: English - Date: 2014-10-27 09:51:46
213Computer access control / HTTP cookie / Hypertext Transfer Protocol / Internet privacy / Cookie / Personal life / World Wide Web

PAVE MEETING: @ 630pm (CA Cafeteria) Meeting called by Melissa & Deanne Welcome and Introductions by Attendees. Family Fun Night Review 

Add to Reading List

Source URL: capave.digitalpto.com

Language: English - Date: 2015-11-16 13:57:41
214Computer access control / Computer security / Identity management / Identity / Equity / Federated identity / Security Assertion Markup Language / Open standard / Trust / Open Identity Exchange / Identity assurance

Final Trust Frameworkweb

Add to Reading List

Source URL: idfederation.org

Language: English - Date: 2014-05-12 11:22:58
215Cryptography / Computer access control / Certificate authority / Security token / Man-in-the-browser / Multi-factor authentication / Smart card / Authentication / IdenTrust

IdenTrust™ Trust Gate www Tr

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2014-04-24 20:51:56
216Microsoft / Computer access control / Password / Security / Registered user / Outlook.com

REGISTRATION AGREEMENT TO VIEW RECORDS ONLINE ROBERT W. GERMAINE, HIGHLANDS COUNTY CLERK OF COURT REQUEST FORM: *Registered User Name: *E-mail Address *Address

Add to Reading List

Source URL: www.hcclerk.org

Language: English - Date: 2016-08-01 15:25:54
217Cognitive science / Artificial intelligence / Cognition / Philosophy / Game theory / Computational trust / Computer access control / Key management / Software agent / Reinforcement learning / Practical reason / Trust

Sequential Decision Making with Untrustworthy Service Providers W. T. Luke Teacy, Georgios Chalkiadakis, Alex Rogers and Nicholas R. Jennings Electronics and Computer Science,University of Southampton Southampton, SO17 1

Add to Reading List

Source URL: www.intelligence.tuc.gr

Language: English - Date: 2008-02-08 15:13:13
218Cryptography / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Computer access control / Certificate authority / Smart card / Public key certificate / Security token / Authentication / Certificate policy

eID Management The right choice for E-Private Banking Liechtensteinische Landesbank AG E-banking is an important service

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:47:38
219Computer access control / Password / Security / Email / Prevention / Safety / Federated identity

Online Grants System Tutorial Module 1 Creating a Profile and Setting Up an Organization

Add to Reading List

Source URL: www.azhumanities.org

Language: English - Date: 2015-10-12 12:33:53
220Security / Computer security / Identity management / Information technology management / Computer access control / Prevention / Access control / Provisioning / Business process management / User provisioning software / Aveksa

Fischer Identity™ Turn Identity Management into a Strategic Advantage Self-Service Portal

Add to Reading List

Source URL: www.fischerinternational.com

Language: English - Date: 2012-05-11 12:48:40
UPDATE