Computer access control

Results: 4654



#Item
831Computer security / Security / Computer access control / Cryptography / Identity management / Cybercrime / Password / Challengeresponse authentication / Computer virus / Antivirus software / Multi-factor authentication / Password policy

“...no one can hack my mind”: Comparing Expert and Non-Expert Security Practices Iulia Ion Rob Reeder

Add to Reading List

Source URL: www.usenix.org

Language: English
832Computer access control / Password / Security / Prevention / Access control / Cybercrime / Password strength

soups_gp_v16_camera_ready

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-05-29 23:53:46
833Computer access control / Computing / Software / Cryptography / Smartphones / Federated identity / Access control / Mobile operating systems / Multi-factor authentication / Authentication / Mobile app / Password

SIGCHI Conference Proceedings Format

Add to Reading List

Source URL: www.medien.ifi.lmu.de

Language: English - Date: 2015-09-15 05:03:41
834Hypertext Transfer Protocol / Computing / Internet privacy / World Wide Web / Computer security / Privacy / Web analytics / Computer access control / HTTP cookie / Google Analytics / HTTPS / Information privacy

Why Have A Privacy Policy? This page will describe management of our web site as regards processing the personal data of users who visit us. This information is provided - also in pursuance of Section 13 of Legislative D

Add to Reading List

Source URL: www.sintechnology.com

Language: English - Date: 2015-07-06 03:17:20
835Access control / Computer access control / Authentication / Computer file / Trusted Computing / File system / Authorization / Facebook / PERMIS / Internet privacy / Windows / Tar

Toward strong, usable access control for shared distributed data

Add to Reading List

Source URL: manyasleeper.com

Language: English - Date: 2015-07-08 14:57:22
836Computer access control / Password / Security / Outlook.com / Login / Features of the Opera web browser / Draft:Intuitive Password

WCO CLiKC!  Connection and Access Guide for Users 1/22  SUMMARY 

Add to Reading List

Source URL: clikc.wcoomd.org

Language: English - Date: 2011-05-31 08:41:19
837

A Framework for Role-Based Access Control in Group Communication Systems Cristina Nita-Rotaru and Ninghui Li Department of Computer Sciences and CERIAS Purdue University 250 N. University Street

Add to Reading List

Source URL: homes.cerias.purdue.edu

Language: English - Date: 2004-07-23 09:04:46
    838Educational software / Learning management systems / Computer access control / Password / Security / Login / Email / Educational technology / Outlook.com

    Learning Management System User Guide Version 4.0 | Updated CCU User Guide: LMS

    Add to Reading List

    Source URL: hbexmail.blob.core.windows.net

    Language: English - Date: 2016-01-19 15:08:41
    839Computing / Computer access control / Cloud standards / Internet protocols / OAuth / Computer security / UMA / Host / Identity management / User-Managed Access

    Scoped Access With UMA Eve Maler and Maciej Machulak on behalf of and with thanks to the UMA Work Group IIW 12 – May

    Add to Reading List

    Source URL: www.xmlgrrl.com

    Language: English - Date: 2012-11-17 22:42:46
    840Computer access control / Obfuscation / Computer security / Cryptography / Password / Security / Brute-force attack / Password policy / Password psychology

    Of Passwords and People: Measuring the Effect of Password-Composition Policies Saranga Komanduri1 , Richard Shay1 , Patrick Gage Kelley1 , Michelle L. Mazurek1 , Lujo Bauer1 , Nicolas Christin1 , Lorrie Faith Cranor1 , a

    Add to Reading List

    Source URL: www.guanotronic.com

    Language: English - Date: 2011-01-14 11:12:10
    UPDATE