Computer access control

Results: 4654



#Item
921Password / Security / Cryptography / Computer access control / Password strength / Password manager

PDF Document

Add to Reading List

Source URL: alliedhealth.lsuhsc.edu

Language: English - Date: 2015-03-04 11:14:18
922Webmail / Computer access control / Password / Security / Outlook.com / Login / Gmail / Form / Self-service password reset

PDF Document

Add to Reading List

Source URL: jagmail.southalabama.edu

Language: English - Date: 2014-11-14 12:49:12
923

Anonymous Access Control with Attribute-Based Encryption Robert R. Enderlein School of Computer and Communication Sciences

Add to Reading List

Source URL: www.e7n.ch

Language: English
    924

    Bitwise Logical Operations in CA-Visual Objects Patrick Lazzarotto Introduction Systems programming applications require low-level control over and access into the computer’s memory.

    Add to Reading List

    Source URL: www.cavo.com

    Language: English
      925

      Modelling Dynamic Access Control Policies for Web-based Collaborative Systems Hasan Qunoo and Mark Ryan School of Computer Science, University of Birmingham, UK Abstract. We present a modelling language, called X-Policy

      Add to Reading List

      Source URL: www.cs.bham.ac.uk.

      Language: English - Date: 2010-02-17 13:26:47
        926Provisioning / Access control / Web Access Management / SCADA / Computer security / Security / Cyber security standards

        foxt_cs_Utility Protects Servers and Data with Access Management.ai

        Add to Reading List

        Source URL: www.foxt.com

        Language: English - Date: 2015-05-01 09:55:45
        927Access control / National Security Agency / Multilevel security / Mandatory access control / Role-based access control / Common Criteria / Security-Enhanced Linux / Labeled Security Protection Profile / Evaluation Assurance Level / Computer security / Security / Evaluation

        Red Hat Enterprise Linux 5 Security Target for CAPP, LSPP and RBAC compliance

        Add to Reading List

        Source URL: www.niap-ccevs.org

        Language: English - Date: 2009-10-08 10:40:04
        928Cryptography / Password / One-time password / IPhone / Software token / Security token / Two-factor authentication / Security / Access control / Computer security

        User Guide Soft Token on your mobile Page 1 of 7 FransiKey

        Add to Reading List

        Source URL: www.alfransi.com.sa

        Language: English - Date: 2014-04-16 04:49:09
        929Computer memory / Bell–LaPadula model / Covert channel / Mandatory access control / Classified information / Htop / CPU cache / Access control / Security clearance / Security / Computer security / Computing

        DAC vs. MAC • Most people familiar with discretionary access control (DAC) - Unix permission bits are an example - Might set a file private so only group friends can read it

        Add to Reading List

        Source URL: www.scs.stanford.edu

        Language: English - Date: 2010-03-04 18:26:58
        930Password / Registered user / Login / User / Federated identity / Apple ID / Two-factor authentication / Security / Access control / Computer security

        ePostoffice User Manual Jan 2015 National Informatics Centre NIC-CISD, Dak Bhawan, New Delhi

        Add to Reading List

        Source URL: www.epostoffice.gov.in

        Language: English - Date: 2015-01-09 00:00:46
        UPDATE