Computer access control

Results: 4654



#Item
501Computer access control / Cryptography / Cybercrime / Password / Security / Computer security / Multi-factor authentication / Authentication / Outline of computer security / Password manager

December 10, 2015 To: Campus Community Fr: Matthew Hall, Associate Vice Chancellor for Information Technology & Chief Information Officer

Add to Reading List

Source URL: cio.ucsb.edu

Language: English - Date: 2015-12-10 11:26:51
502Biometrics / Security / Computer access control / Identification / Surveillance / Speaker recognition / Password / Authentication / Computer security

Copyright 2013 Society of Photo Optical Instrumentation Engineers. One print or electronic copy may be made for personal use only. Systematic reproduction and distribution, duplication of any material in this paper for a

Add to Reading List

Source URL: www.wjscheirer.com

Language: English - Date: 2013-07-07 22:38:19
503Computer access control / Identity management / Federated identity / Security / Computer security / Single sign-on / Authentication / Password / Information security / Privacy / Health Insurance Portability and Accountability Act / Electronic authentication

Privacy Implications for Single Sign-on Authentication In a Hospital Environment Rosa R. Heckle Wayne G. Lutters

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-06-22 15:47:38
504Computer access control / Access control / XACML / Role-based access control / PERMIS / Authorization / Role hierarchy / Data integration / Spring Framework / Attribute-Based Access Control / OAuth

Role-Based Access Control for e-Service Integration Peter Lamb, Robert Power, Gavin Walker and Michael Compton CSIRO ICT Centre GPO Box 664 Canberra ACT 2601 Australia +

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-06-02 01:58:17
505Computer security / Cryptography / Identity management / Computer network security / Security / Password / Information technology controls / Security controls / Access control

Security Strategy White Paper This white paper references Health Insurance Portability and Accounting Act () Security strategies that QSI clients may pursue to help conform their use of the system to meet the Security Pr

Add to Reading List

Source URL: www.qsii.com

Language: English - Date: 2014-01-28 14:18:07
506Computer access control / Password / Security / Draw a Secret / Identity management / Cognitive password

The Impact of Cues and User Interaction on the Memorability of System-Assigned Recognition-Based Graphical Passwords Mahdi Nasrullah Al-Ameen, Kanis Fatema, Matthew Wright, Shannon Scielzo The University of Texas at Arli

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-02-21 12:56:56
507Internet privacy / Privacy / Identity documents / Computer access control / HTTP cookie / Hypertext Transfer Protocol / Google Analytics / Personally identifiable information / Information privacy / Password / P3P / Zombie cookie

COMPANY SHOP LIMITED – PRIVACY POLICY Company Shop Limited (we) are committed to protecting and respecting your privacy. This policy (together with our Terms and Conditions, http://www.staffshop.co.uk and any other doc

Add to Reading List

Source URL: community-shop.co.uk

Language: English - Date: 2015-06-05 11:14:41
508Information privacy / Privacy / Internet privacy / Computer access control / HTTP cookie / Hypertext Transfer Protocol / London Stock Exchange / Privacy policy / Personally identifiable information / Google Analytics / Opt-out / Data Protection Act

INFORMATIVE DOCUMENT AS PER ART. 13 LEGISLATIVE DECREE 196 OF JUNE "PROTECTION OF PERSONS AND OTHERS WITH RESPECT TO THE PROCESSING OF PERSONAL DATA" The Code on the protection of personal data, adopted with the

Add to Reading List

Source URL: www.mtsmarkets.com

Language: English - Date: 2015-06-25 09:15:24
509Computer network security / Computer access control / ESET / Multi-factor authentication / Authentication / OpenVPN / Virtual private network / RADIUS / Password / Internet Authentication Service / Electronic authentication

logotype - ESET Secure Authentication

Add to Reading List

Source URL: static4.esetstatic.com

Language: English - Date: 2015-07-29 05:51:23
510E-commerce / Computer security / Access control / Identity management / Security / Password / Public key certificate

JACKSON MUNICIPAL AIRPORT AUTHORITY (JMAA) PERSONNEL AND VEHICLE ACCESS MEDIA APPLICATION REQUIREMENTS All persons working on the premises at Jackson-Evers International Airport (JEIA) are required to obtain and display

Add to Reading List

Source URL: www.jmaa.com

Language: English - Date: 2013-01-09 15:19:56
UPDATE