Computer access control

Results: 4654



#Item
901Security / Computer security / Identity management / Information technology management / Computer access control / Prevention / Access control / Provisioning / Business process management / User provisioning software / Aveksa

Fischer Identity™ Turn Identity Management into a Strategic Advantage Self-Service Portal

Add to Reading List

Source URL: www.fischerinternational.com

Language: English - Date: 2012-05-10 15:11:10
902Computing / Cloud standards / Computer access control / Application programming interfaces / OAuth / Web API / IBM API Management / API Security

E*TRADE Developer Platform

Add to Reading List

Source URL: content.etrade.com

Language: English - Date: 2012-10-31 13:53:36
903Computing / Semantic Web / Data management / Social networking services / Web services / Computer access control / WebID / SPARQL / FOAF / Resource Description Framework / WebDAV / HTTP 403

Using RDF Metadata To Enable Access Control on the Social Semantic Web James Hollenbach, Joe Presbrey, and Tim Berners-Lee Decentralized Information Group, MIT CSAIL, 32 Vassar Street, Cambridge, MA, USA, 02139 {jambo,pr

Add to Reading List

Source URL: dig.csail.mit.edu

Language: English - Date: 2011-02-01 14:35:26
904Cybercrime / Computer access control / Phishing / Social engineering / Spamming / Crime / Transaction authentication number / Financial technology / Fraud

AF-TRUST-GNC - Annual Review Presentations

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:03
905Computer access control / Subscriber identity module / Geographic information system

S EMANTICS IN GIS CIENCE S IMILARITY R EASONING SIM − DLA

Add to Reading List

Source URL: geog.ucsb.edu

Language: English - Date: 2011-07-21 01:37:42
906Cryptography / Computing / Secure communication / Transport Layer Security / Cryptographic protocols / Computer access control / Public key infrastructure / Public-key cryptography / Internet Relay Chat / Key management / Cryptographic hash function / Challengeresponse authentication

SafeSlinger: Easy-to-Use and Secure Public-Key Exchange Michael Farb Yue-Hsun Lin Tiffany Hyun-Jin Kim

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:14
907

Verification of agent knowledge in dynamic access control policies∗ Masoud Koleini, Eike Ritter and Mark Ryan School of Computer Science The University of Birmingham Birmingham, B15 2TT, UK

Add to Reading List

Source URL: www.cs.bham.ac.uk.

Language: English - Date: 2013-12-10 12:19:33
    908Computing / Cryptography / Computer security / Computer network security / Cyberwarfare / Password / Denial-of-service attack / Firewall / SOAP / Authentication / Public-key cryptography / Internet security

    Evidence-Based Access Control for Ubiquitous Web Services Nishith Khantal IIT, Kanpur

    Add to Reading List

    Source URL: w2spconf.com

    Language: English - Date: 2012-02-07 16:10:03
    909Cryptography / Computer access control / Obfuscation / Password / Security / Salt / Crypt / Password strength / Password cracking

    PKC 2015 – March 31st Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions Jan Camenisch, Robert R. Enderlein, Gregory Neven

    Add to Reading List

    Source URL: www.e7n.ch

    Language: English
    910Computer access control / Identity documents / Access control / Authentication / Notary / Packaging / Multi-factor authentication / Personal identification number

    FBMS Personal Identification Verification Card Access The FBMS system has recently migrated to a new platform, changing the path to access FBMS. You will now be required to access FBMS through the Department of the Inter

    Add to Reading List

    Source URL: www.bie.edu

    Language: English - Date: 2015-06-29 15:07:41
    UPDATE