Computer access control

Results: 4654



#Item
811Crime prevention / Cryptography / Information governance / National security / Computer security / Covert channel / Information flow / Program slicing / Mandatory access control / Alloy Analyzer / Domain-specific language / Information security

A Security Domain Model for Static Analysis and Verification of Software Programs Alan B. Shaffer Naval Postgraduate School Computer Science Dept Monterey, CA, USA

Add to Reading List

Source URL: cisr.nps.edu

Language: English - Date: 2008-08-18 13:41:06
812Computer security / Computer access control / Information theory / Access control / Mandatory access control / BellLaPadula model / Trusted Computing / Trusted computing base / Principle of least privilege / Information flow / Security kernel

A Security Domain Model for Implementing Trusted Subject Behaviors Alan Shaffer, Mikhail Auguston, Cynthia Irvine, Timothy Levin  Naval Postgraduate School, Computer Science Department, 1411 Cunningham Rd., Monterey, Ca

Add to Reading List

Source URL: cisr.nps.edu

Language: English - Date: 2008-08-18 13:41:12
813Computer memory / Parallel computing / Remote direct memory access / Distributed memory / Distributed computing / Virtual memory / FIFO / Memory management / CPU cache / Data buffer / Transmission Control Protocol / SHMEM

A New DMA Registration Strategy for Pinning-Based High Performance Networks Christian Bell Dan Bonachea Computer Science Division University of California, Berkeley

Add to Reading List

Source URL: titanium.cs.berkeley.edu

Language: English - Date: 2014-04-29 06:11:57
814Employment compensation / Access control / Authorization / Computer access control / Payroll

Signature Authorization or Cancellation U242 Instructions: A signature authorization remains in effect until cancelled. An employee

Add to Reading List

Source URL: www.policies.uci.edu

Language: English - Date: 2015-07-08 19:06:58
815Access control / Identifiers / Identity management / Computer access control / Automatic identification and data capture / EPCglobal / Authentication / Radio-frequency identification / Track and trace / Digital identity / Business process modeling / Electronic Product Code

Microsoft Word - epedigree_with_dual_ownership_ubisafe_ai_final.doc

Add to Reading List

Source URL: cocoa.ethz.ch

Language: English - Date: 2013-05-23 02:08:29
816Computer access control / Identity management / Computer security / Identity / Federated identity / Cloud standards / OAuth / Information Card / Location-based service / Internet privacy / Authentication / Identity management system

The Case for a Location Metasystem Nick Doty School of Information, UC Berkeley ABSTRACT

Add to Reading List

Source URL: npdoty.name

Language: English - Date: 2014-03-25 02:38:49
817Economy / Financial services / Money / Wirecard / Computer access control / Online banking / Financial regulation / Transaction authentication number / Etan / Iban / International Bank Account Number

WDB_eBanking_Erstbenutzung_GK_PK_DE_EN.indd

Add to Reading List

Source URL: www.wirecardbank.com

Language: English - Date: 2016-01-14 06:56:06
818Computer access control / Internet privacy / Business continuity and disaster recovery / Privacy / Password / SQL injection / HTTP cookie / Backup / 4chan / Login / World Wide Web / Information privacy

8ch.net Privacy Policy Supersedes previous privacy policy dated DecemberWednesday, July 8, 2015; Effective Wednesday, July 22, 2015 Contents

Add to Reading List

Source URL: 8ch.net

Language: English - Date: 2015-07-08 06:51:12
819Internet privacy / Hypertext Transfer Protocol / Computer access control / HTTP cookie / World Wide Web / Privacy / Session / Zombie cookie / Local shared object

COOKIES  POLICY  –  Extended  statement   What  are  cookies? Cookies  are  small  text  strings  that  the  websites  visited  send  to  the  devices,  where

Add to Reading List

Source URL: www.moleskinerie.com

Language: English - Date: 2015-09-16 14:51:25
820Computer security / Cryptography / Computer access control / Cybercrime / Social engineering / Cloud standards / Hypertext Transfer Protocol / Phishing / Password / Cross-site scripting / OpenID / Multi-factor authentication

PhishSafe: Leveraging Modern JavaScript API’s for Transparent and Robust Protection Bastian Braun Martin Johns

Add to Reading List

Source URL: dl.dropboxusercontent.com

Language: English
UPDATE