Computer access control

Results: 4654



#Item
821

Access Control Models for Geo-Social Computing Systems Ebrahim Tarameshloo Philip W. L. Fong Department of Computer Science,

Add to Reading List

Source URL: pages.cpsc.ucalgary.ca

Language: English - Date: 2014-06-29 17:38:03
    822OSI protocols / Internet Standards / Internet protocols / Wireless networking / Communications protocol / Data transmission / Transport layer / Data link layer / Link layer / Reliability / Media access control / ZigBee

    A Unifying Link Abstraction for Wireless Sensor Networks Joseph Polastre, Jonathan Hui, Philip Levis, Jerry Zhao, David Culler, Scott Shenker, and Ion Stoica Computer Science Department University of California, Berkeley

    Add to Reading List

    Source URL: csl.stanford.edu

    Language: English - Date: 2006-05-10 08:41:27
    823Computer access control / Legal research / LexisNexis / Open-source intelligence / Reed Elsevier / RELX Group / Identity theft / Authentication / Identity management

    White Paper Proving Identity Using LexisNexis® Identity Management Solutions Do you know who you’re talking to? Validate and authenticate identities with more confidence.

    Add to Reading List

    Source URL: lexisnexis.com

    Language: English - Date: 2014-10-15 08:44:06
    824Computer access control / Hypertext Transfer Protocol / Descriptor / Information science / Public-key cryptography / HTTP cookie / Transmission Control Protocol

    Virtual Private Services Karsten Loesing and Guido Wirtz , Tor Tech Report∗ July 25, 2008

    Add to Reading List

    Source URL: research.torproject.org

    Language: English - Date: 2012-10-15 09:51:47
    825Computer access control / Obfuscation / Cryptography / Computer security / Password / Passphrase / Salt / Password psychology / Password fatigue

    SYSADMIN Helping Users Create Better Passwords B L A S E U R , PAT R I C K G A G E K E L L E Y, S A R A N G A K O M A N D U R I , J O E L L E E , M I C H A E L M A A S S , M I C H E L L E L . M A Z U R E K , T I M OT H

    Add to Reading List

    Source URL: patrickgagekelley.com

    Language: English - Date: 2013-05-01 19:52:01
    826Computer security / Security / Computer access control / Identity management / Fraud / Identity theft / Authentication / Identity fraud / LexisNexis / Biometrics / Identity verification service / RELX Group

    White Paper Combating Identity Fraud: An Overview of Complementary Approaches Identity fraud demands constantly evolving

    Add to Reading List

    Source URL: lexisnexis.com

    Language: English - Date: 2014-10-15 08:43:57
    827Internet privacy / Computer access control / HTTP cookie / Hypertext Transfer Protocol / User agent / Google Chrome / HTTP referer / Online advertising / Ad blocking

    Fraud taxonomy March, 2015 The terms defined in the taxonomy below are not necessarily mutually exclusive of one another. Ad impressions can have different but sometimes overlapping definitions. Illegitimate and Non-Huma

    Add to Reading List

    Source URL: www.tagtoday.net

    Language: English - Date: 2015-03-23 16:50:31
    828Health / Computer security / Identity management / Computer access control / Health informatics / Health economics / Public health / Identity theft / Personal health record / Authentication / Identity assurance / Health information exchange

    White Paper The Most Important Question in Identity Management for Health Care Your answer points the way to preventing medical

    Add to Reading List

    Source URL: lexisnexis.com

    Language: English - Date: 2014-10-15 08:44:01
    829Hacking / Cloud standards / Computer access control / Computer network security / Web development / JavaScript / HTTP cookie / Password manager / Cross-site request forgery / Cross-site scripting / Browser security / OAuth

    Language-based Defenses against Untrusted Browser Origins Karthikeyan Bhargavan and Antoine Delignat-Lavaud, INRIA Paris-Rocquencourt; Sergio Maffeis, Imperial College London This paper is included in the Proceedings of

    Add to Reading List

    Source URL: www.defensivejs.com

    Language: English - Date: 2013-08-15 09:17:30
    830Security / Computer security / Access control / Computer access control / Role-based access control / Role hierarchy / PERMIS / Object Process Methodology / Database security / Metamodeling / Inference attack

    Monitoring Database Access Constraints with an RBAC Metamodel: a Feasibility Study Lars Hamann, Karsten Sohr, and Martin Gogolla University of Bremen, Computer Science Department DBremen, Germany {lhamann,sohr,gog

    Add to Reading List

    Source URL: www.db.informatik.uni-bremen.de

    Language: English - Date: 2014-12-06 08:06:31
    UPDATE