Computer access control

Results: 4654



#Item
791Computer security / Security / Cryptography / Identity management / Computer access control / IAM / Authentication / Biometrics

INTRODUCTION TO IDENTITY MANAGEMENT INTERNET2 TECHNOLOGY EXCHANGE OCTOBER 28, 2014 Nathan Dors

Add to Reading List

Source URL: meetings.internet2.edu

Language: English - Date: 2014-11-06 16:31:04
792Cryptography / Computer access control / Computer security / Certificate authority / IdenTrust / Identity theft / Digital identity / Multi-factor authentication / Authentication / Smart card / E-commerce / Health Insurance Portability and Accountability Act

The Payment Factory: Strengthening Compliance and Improving Internal Controls for Corporate Treasurers IdenTrust

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2012-07-10 20:41:47
793Security / Cryptography / Prevention / Identity management / Public-key cryptography / Computer networking / Content centric networking / Access control / IBAC / Encryption

Interest-Based Access Control in CCN Cesar Ghali, Marc A. Schlosberg, Gene Tsudik, Christopher A. Wood Department of Computer Science University of California Irvine

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2015-10-03 12:09:18
794Wirecard / Computer access control / Online banking / Etan / Transaction authentication number / East Timor and Indonesia Action Network / Fax / Maestro

eBanking First Use Information on the eBanking services of Wirecard Bank AG All you need is a PC with Internet access, the eTAN Generator and your ec/Maestro card to authorize your payments. Before using our eBanking ser

Add to Reading List

Source URL: www.wirecardbank.com

Language: English - Date: 2015-05-12 04:27:22
795Computer access control / E-commerce / Online banking / Cybercrime / Security token / Bank / Transaction authentication number / User / Password / Computer security / Multi-factor authentication / Guardian Analytics

Online Banking User Guide Business Online Security The security of your information is one of our most important responsibilities. You can be confident, knowing that Alpine Bank is dedicated to ensuring the highest level

Add to Reading List

Source URL: www.alpinebank.com

Language: English - Date: 2013-12-17 13:20:47
796

Efficient Techniques for Realizing Geo-Spatial Access Control Marina Blanton Department of Computer Science Purdue University

Add to Reading List

Source URL: www.cse.nd.edu

Language: English - Date: 2007-08-02 16:59:36
    797Identity management / Computer access control / Federated identity / Access control / Authentication / Notary / Knowledge-based authentication / Multi-factor authentication / Know your customer / Analytics / Electronic authentication / Digital identity

    White Paper The Most Important Question in Customer/Constituent Identity Management Discover the answers for balancing increased value

    Add to Reading List

    Source URL: lexisnexis.com

    Language: English - Date: 2014-10-15 08:44:10
    798Eye / Computer access control / Cognitive science / Vision / Surveillance / Eye tracking / Authentication / Biometrics / Eye movement / Support vector machine / Human eye / Login

    Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics Simon Eberz Kasper B. Rasmussen

    Add to Reading List

    Source URL: www.lenders.ch

    Language: English - Date: 2015-02-17 04:13:11
    799Security / Prevention / Safety / Computer security / National security / Crime prevention / Cryptography / Information security / Apollo / Access control / Vulnerability / Security awareness

    Apollo Education Group Information Security Third Party Information Security Standards Document Type: Standard Document Serial No. [TBD per applicable matrix]

    Add to Reading List

    Source URL: www.apollo.edu

    Language: English - Date: 2016-02-17 20:25:04
    800United States Department of Justice / United States Department of Homeland Security / ISO/IEC 11179 / Metadata registry / National Information Exchange Model / Computer access control / Interoperability / Federated identity / Reuse

    Overview of the Open Justice Broker Consortium What is the OJBC? What is it? ■ A new consortium of justice organizations / initiatives /

    Add to Reading List

    Source URL: www.ojbc.org

    Language: English - Date: 2015-04-15 14:21:03
    UPDATE