Computer access control

Results: 4654



#Item
801Identity management / Computer access control / Computer network security / Authentication / Notary / Packaging / Knowledge-based authentication / Layered security / Analytics / Identity verification service / LexisNexis

White Paper The Role of Knowledge Based Authentication (KBA) In Identity Proofing Knowledge Based Authentication [KBA]

Add to Reading List

Source URL: lexisnexis.com

Language: English - Date: 2014-10-15 08:44:07
802

Towards Modelling and Verifying Dynamic Access Control Policies for Web-based Collaborative Systems Hasan Qunoo, Masoud Koleini and Mark Ryan School of Computer Science, University of Birmingham, UK Abstract. We propose

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2010-05-14 12:02:36
    803Cryptography / Computer access control / Cryptographic protocols / Password-authenticated key agreement / Password / Passwd / Encrypted key exchange / Crypt / Password Authenticated Key Exchange by Juggling

    Oblivious PAKE: Efficient Handling of Password Trials F. Kiefer, M. Manulis

    Add to Reading List

    Source URL: isc2015.item.ntnu.no

    Language: English - Date: 2015-09-19 12:50:59
    804Cryptography / Computer security / Computing / Computer access control / Federated identity / Access control / Computer network security / Electronic authentication / Identity management / Authentication / OpenSSH / Application security

    Adaptive Defenses for Commodity Software through Virtual Application Partitioning

    Add to Reading List

    Source URL: www.cs.columbia.edu

    Language: English - Date: 2012-10-05 00:01:36
    805

    Modelling Dynamic Access Control Policies for Web-based Collaborative Systems Hasan Qunoo and Mark Ryan School of Computer Science, University of Birmingham, UK Abstract. We present a modelling language, called X-Policy

    Add to Reading List

    Source URL: www.cs.bham.ac.uk

    Language: English - Date: 2010-02-17 13:26:47
      806Computer security / Security / Computer access control / Cybercrime / Identity management / Computer network security / Password / Multi-factor authentication / Phishing / Authentication / Transaction authentication number / LastPass

      Security for an age of zero trust A Two-factor authentication:

      Add to Reading List

      Source URL: www.ciosummits.com

      Language: English - Date: 2016-01-25 16:20:59
      807Computing / Computer access control / Prevention / Cloud computing / Cloud infrastructure / Password / Identity management / SAML-based products and services / Central Authentication Service

      CAS’s IDP system and resources in Education Cloud DAREN ZHA CANS2015, Chengdu Outline

      Add to Reading List

      Source URL: free.eol.cn

      Language: English - Date: 2015-09-28 11:36:24
      808Computer access control / Identity management / Computer security / Identity / Federated identity / Metadata standards / Identity assurance / OpenID / SAML 2.0 / Security Assertion Markup Language / Identity provider / Authentication

      Toward Mending Two Nation-Scale Brokered Identification Systems

      Add to Reading List

      Source URL: petsymposium.org

      Language: English - Date: 2015-06-23 17:21:44
      809Computer access control / Login / Educational technology / Polaris

      Tuesday, February 17th, 2015 Dear Polaris Families, Hope you’re staying warm in this cold wintery weather! We wanted to reach out and alert you all to our new Technology Program:

      Add to Reading List

      Source URL: www.pcachicago.org

      Language: English - Date: 2015-02-24 15:03:33
      810

      A Constructive Conditional Logic for Access Control: a completeness result and a sequent calculus Valerio Genovese1, Laura Giordano2, Valentina Gliozzi3 , and Gian Luca Pozzato3 1 Computer Science and Communications Res

      Add to Reading List

      Source URL: ceur-ws.org

      Language: English - Date: 2010-06-07 09:03:32
        UPDATE