Computer access control

Results: 4654



#Item
271Computing / Computer security / Utility software / Identity management / Computer access control / SOA Security / WS-Security / Security Assertion Markup Language / WS-SecureConversation / WS-Policy / Security Patterns / XML Signature

trust claims buffer overrun tokens

Add to Reading List

Source URL: www.soaschool.com

Language: English - Date: 2013-01-08 15:17:40
272Security / Prevention / Computer security / Yves Bhar / Access control / Bessemer

August Raises $38 Million In Series B Funding Led By Bessemer Venture Partners Investment to Fuel Creation of New Products that Define Home Access SAN FRANCISCO—March 25, 2015—August, the technology company that brin

Add to Reading List

Source URL: august.com

Language: English - Date: 2016-04-20 19:27:45
273Computer access control / Software / Computer security / Access control / FIPS 201 / PIV / Login / Single sign-on / Password / SharePoint

PIV Login Quick Reference Guide   PIV Users can only login with Internet Explorer What is PIV and who uses it?

Add to Reading List

Source URL: floodmaps.fema.gov

Language: English - Date: 2016-03-23 12:12:55
274Computer access control / Prevention / Software / Password / Security / Web portal / Access control / Login / Form

LOPR Portal Notification User Guide Regulatory Division Bourse de Montréal Inc. Document Revision: 1.0

Add to Reading List

Source URL: reg.m-x.ca

Language: English - Date: 2016-05-03 12:26:34
275Cryptography / Computer security / Computer access control / Identity management / Public-key cryptography / Federated identity / Cryptographic protocols / Digital credential / Authentication / Credential / Multi-factor authentication / Access control

Concepts and Languages for Privacy-Preserving Attribute-Based AuthenticationI,II Jan Camenischa,∗, Maria Dubovitskayaa,b , Robert R. Enderleina,b,∗∗, Anja Lehmanna , Gregory Nevena , Christian Paquinc , Franz-Stefa

Add to Reading List

Source URL: www.e7n.ch

Language: English
276Computer access control / Cryptography / Automatic identification and data capture / Computer security / Security / Ubiquitous computing / Privacy / Radio-frequency identification / Wireless / Authentication / Challengeresponse authentication / Password

Microsoft Word - final_revised.doc

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2006-06-19 05:33:30
277Economy / Payment systems / Computer access control / Money / E-commerce / Finance / EMV / One-time password / 3-D Secure / Authentication / Multi-factor authentication / Mobile payment

AN EMV MIGRATION FORUM WHITE PAPER Near-Term Solutions to Address the Growing Threat of Card-Not-Present Fraud Version 2.0

Add to Reading List

Source URL: www.emv-connection.com

Language: English - Date: 2016-08-02 12:07:00
278Computing / Software / Computer access control / Login / Prevention / Portable Document Format / Password / Form

AK2015_DRA_ReportSite_UserManual_VF

Add to Reading List

Source URL: education.alaska.gov

Language: English - Date: 2015-06-29 13:29:45
279Microsoft / Software / Computing / Jewish genealogy / JewishGen / Computer access control / Webmail / Password / Outlook.com / Form / Login / Email

Microsoft Word - 2015Creating a New JewishGen Account.docx.doc

Add to Reading List

Source URL: jgsgb.org

Language: English - Date: 2015-10-07 15:48:10
280Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Computer access control / Internet Standards / Internet protocols / Transport Layer Security / OpenSSL / Authentication / Password

eID Online Authentication Network Threat Model, Attacks and Implications Christian Rossow1,2 , Christian J. Dietrich1,3 , Norbert Pohlmann1 1 Institute for Internet Security, University of Applied Sciences Gelsenkirchen

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 13:18:07
UPDATE