Computer access control

Results: 4654



#Item
331Computer access control / Computer security / Cryptography / Security / Password / Authentication / Login

FAQs for digital science online Q. What browsers work best with Digital Science Online?

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2015-02-05 15:05:36
332Software / Computing / Directory services / Computer access control / Lightweight Directory Access Protocol / Oracle Database / MySQL

InfoRouter Upgrade Guide - V7.2 to V8.0 InfoRouter Upgrade Guide Version 7.2 to Version 8.0 Active Innovations, Inc. Copyright InfoRouter Upgrade Guide - V7.2 to V8.0

Add to Reading List

Source URL: www.inforouter.com

Language: English - Date: 2015-03-26 12:09:23
333World Wide Web / Internet privacy / Food and drink / Computer access control / HTTP cookie / Hypertext Transfer Protocol / Computing / Google Analytics / Cookie / Google Search / Zombie cookie / Local shared object

Cookie Policy Most of our web pages use “cookies”. A cookie is a small file of letters and numbers that we place on your computer or mobile device if you agree. These cookies allow us to distinguish you from other us

Add to Reading List

Source URL: www.aaschool.ac.uk

Language: English - Date: 2016-07-25 04:54:30
334Computing / Security / Computer security / Computer access control / Computer systems / Cryptography / National security / Log management / Logfile / Log analysis / Event Viewer / WS-Security

Building Security In Editors: John Steven, Gunnar Peterson, Deborah A. Frincke, Logging in the

Add to Reading List

Source URL: arctecgroup.net

Language: English - Date: 2009-05-28 19:06:28
335Software engineering / Computing / Programming language theory / Computer access control / Subscriber identity module / C

Personal Identification Information in Property Data Code of Conduct Application to become a Code Subscriber When completed this application, together with an executed copy of the ‘Deed of Agreement to the Personal Ide

Add to Reading List

Source URL: www.propertydatacodeofconduct.com.au

Language: English - Date: 2016-05-23 01:44:02
336Internet privacy / Computer access control / HTTP cookie / Hypertext Transfer Protocol / Computing / Computer security / Information privacy / Network Advertising Initiative / Cookie / Zombie cookie

Generic Cookies Policy template    Cookies Policy    Last updated: ​

Add to Reading List

Source URL: media.termsfeed.com

Language: English - Date: 2016-03-07 14:52:12
337Access control / Computer access control / Prevention / Password / Security / Insurance / Login / Form

Phly.com User Guide Insured Version Please use the following index links to quickly access the information being looked for: My PHLY Registration My PHLY Home

Add to Reading List

Source URL: www.phly.com

Language: English - Date: 2016-05-25 17:18:22
338Security / Computer access control / Computing / Cryptography / Access control / Authentication / Authorization / SOAP / Kerberos

An authorization control framework to enable service composition across domains Takashi Suzuki University of California, Berkeley Berkeley, CA

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2002-02-14 23:42:26
339Computing / Cloud standards / Software / Application programming interfaces / Computer access control / OAuth / Mobile app / OpenID / Open API / Mobile backend as a service / Kony /  Inc.

CA Mobile App Services - Data Sheet

Add to Reading List

Source URL: itworldcanada.com

Language: English - Date: 2016-04-14 13:47:19
340Computer security / Computer access control / Access control / Role-based access control / Data security / NIST RBAC model / Role hierarchy / Petri net / PERMIS / XACML / Model-based testing / Reliability engineering

IEEE TRANSACTIONS ON COMPUTERS, MANUSCRIPT ID 1 Automated Model-Based Testing of RoleBased Access Control Using Predicate/Transition Nets

Add to Reading List

Source URL: www.itrust.lu

Language: English - Date: 2015-05-05 11:12:03
UPDATE