Computer access control

Results: 4654



#Item
491Computer network security / ISO standards / Computer access control / Access control / Internet protocols / Common Criteria / Security Target / Authentication / Computer security / Key management / Password / Virtual private network

collaborative Protection Profile for Network Devices

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2016-07-22 07:40:18
492Access control / Authorization / Computer access control

Microsoft Word - DCF-2131(T).docx

Add to Reading List

Source URL: www.ct.gov

Language: English - Date: 2016-08-09 11:44:52
493Computer access control / Public-key cryptography / Identity management / Mobile signature / Signature / Security token / Public key infrastructure / Authentication / 3-D Secure / Electronic authentication / Disk encryption

Keyhub_Product_Overview_28

Add to Reading List

Source URL: www.iquestgroup.com

Language: English - Date: 2016-05-10 04:15:28
494Internet privacy / Computer access control / HTTP cookie / Hypertext Transfer Protocol / Personally identifiable information / Privacy

The Missouri Park and Recreation Association (MPRA) is committed to protecting your privacy. This Statement of Privacy applies to the MPRA website at www.mopark.org and governs its data collection and usage. By using the

Add to Reading List

Source URL: www.mopark.org

Language: English - Date: 2013-07-29 14:40:25
495Identity management / Computer access control / Metadata standards / Security Assertion Markup Language / Federated identity / SAML-based products and services / SAML 2.0

TCS SAML demo background https://www.digicert.com/sso David Groep TCS PMA and Nikhef TCS TNC2015 Workshop

Add to Reading List

Source URL: certificate.nikhef.nl

Language: English - Date: 2015-06-26 06:16:58
496Computer access control / Biometrics / Identification / Surveillance / Data security / Authentication / Strong authentication / Biometric Tokenization / Biometric passport

Trusted BWI: Privacy and Trust Enhanced Biometric Web Identities Abdullah A. Albahdal, Hamdan Alzahrani, Lalit Prithviraj Jain, and Terrance E. Boult University of Colorado at Colorado Springs Colorado Springs, CO 80918

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2013-12-13 11:56:27
497Internet privacy / Webmail / Computer access control / HTTP cookie / Hypertext Transfer Protocol / Email / Outlook.com / Privacy policy / Privacy / Personally identifiable information / Privacy concerns regarding Google / P3P

InCommon Privacy Policy I. Introduction The InCommon Federation (“InCommon”) recognizes and respects the privacy interests of its

Add to Reading List

Source URL: www.incommon.org

Language: English - Date: 2016-04-11 09:08:03
498Identity management / Computer access control / Federated identity / Digital technology / Digital identity / Authentication / Liberty Alliance / Security Assertion Markup Language / Identity theft / Identity / Identity assurance / Electronic authentication

Microsoft PowerPoint - greenwood-OECD-Norway-07-MAY-07.ppt

Add to Reading List

Source URL: www.oecd.org

Language: English - Date: 2016-03-29 12:11:08
499Identity management / Computer access control / Federated identity / Internet Standards / Shibboleth / Security Assertion Markup Language / Privacy policy / Authentication / Internet privacy / Privacy

Building and (inter)operating AA services. A tour into reality TERENA Mini Symposium on AA Prague, 24 October 2002

Add to Reading List

Source URL: papi.rediris.es

Language: English - Date: 2007-10-13 04:03:52
500Cloud computing / Computer security / Computer access control / Computer network security / Virtual private cloud / Cloud computing security / Authentication / Internet security / Privileged identity management

denial-of-service spoofing application delivery controller (ADC)

Add to Reading List

Source URL: cloudschool.com

Language: English - Date: 2016-06-06 17:05:54
UPDATE