Computer access control

Results: 4654



#Item
231Security / Computer security / Computer access control / Access control / Identity management / Perimeter security / PERMIS / Trust management / Authentication / Authorization

The Role of Trust Management in Distributed Systems Security Matt Blaze1 , Joan Feigenbaum1 , John Ioannidis1 , and Angelos D. Keromytis2 1 AT&T Labs - Research

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2001-10-24 10:48:32
232Security / Prevention / Safety / Computer access control / Computer security / Crime prevention / National security / Single sign-on / Password / Authentication / Cyber-security regulation / Information security

DesignSafe CyberSecurity Plan 1.   Overview DesignSafe is an open CI that enables and supports leading-edge scientific discovery and promotes science and technology education. While it must be a widely accessible platfo

Add to Reading List

Source URL: www.designsafe-ci.org

Language: English - Date: 2016-05-18 14:32:56
233Humancomputer interaction / Computer security / Computer access control / Password / Security / Cybercrime / Security token / Eye tracking / Virtual keyboard / Challengeresponse authentication / Keystroke logging / Keystroke dynamics

Microsoft Word - SOUPSReducing Shoulder-surfing by Using Gaze-based Password Entry _final for publishing_.doc

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-05-29 23:54:36
234Computer access control / Cryptography / Humancomputer interaction / Technical communication / Usability / Authentication / Computer security / Security

SOUPSPersonal Choice and Challenge Questions: A Security and Usability Assessment 16 July 2009

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2009-07-16 14:02:05
235Computer architecture / Software / System software / Kernel / Linux kernel / Operating system / Mandatory access control / Real-time operating systems

High Robustness Cross Domain Solutions Tiger Team John Mildner Jennifer Guild

Add to Reading List

Source URL: fm.csl.sri.com

Language: English - Date: 2011-12-15 18:21:31
236Cryptography / Security / Computer security / Computer access control / Public-key cryptography / Electronic documents / Notary / SAFE-BioPharma Association / Identity management / Digital signature / SAFE / Authentication

VASCO MYDIGIPASS Gains SAFE-BIOPHARMA Full-Service Credential Service Provider Certification OAKBROOK TERRACE, IL and TENAFLY, NJ – August 10, VASCO Data Security International, Inc. (NASDAQ: VDSI), a global le

Add to Reading List

Source URL: www.safe-biopharma.org

Language: English - Date: 2016-08-10 11:17:32
237Computer access control / Computer security / Security / Phishing / Password / Multi-factor authentication / Authentication / Transaction authentication number / Passwd / One-time password / Security token

Covert Channels Can Be Useful! – Layering Authentication Channels to Provide Covert Communication? Mohammed H. Almeshekah, Mikhail J. Atallah, and Eugene H. Spafford Purdue University CERIAS 656 Oval Drive, West Lafaye

Add to Reading List

Source URL: spaf.cerias.purdue.edu

Language: English - Date: 2013-03-04 21:29:09
238World Wide Web / Internet privacy / Marketing / Internet marketing / Computer access control / HTTP cookie / Hypertext Transfer Protocol / Computing / Web analytics / Google Analytics / Online advertising / Opt-out

Cookie Policy Last update: June 2015 What are cookies? The site hunimed.eu uses cookies. As clarified in FAQs section of “Garante Privacy” in December 2012, available on www.garanteprivacy.it, cookies are defined as

Add to Reading List

Source URL: www.hunimed.eu

Language: English - Date: 2015-08-04 08:04:03
239Computer access control / Access control / Authorization

Microsoft Word - temporary-transfer-authorization.doc

Add to Reading List

Source URL: ehs.missouri.edu

Language: English - Date: 2016-07-06 13:08:30
240Computer access control / Computer security / Cryptography / Access control / Password / Authentication / Challengeresponse authentication / Login / Self-service password reset / Password policy

GAP Access 2-Step Authentication 1. Access the GAP Access Login page. Enter your ID and password, click Login 2. One of the challenge questions the user provided an answer to when signing up for GAP

Add to Reading List

Source URL: www.isac.org

Language: English - Date: 2014-12-01 12:43:45
UPDATE