Computer access control

Results: 4654



#Item
961Public safety / Computer network security / Electronic commerce / Crime prevention / National security / Information security / Password / Cloud computing security / Access control / Security / Computer security / Cyberwarfare

Access Security Requirements

Add to Reading List

Source URL: checkpointscreening.com

Language: English - Date: 2015-03-09 19:01:58
962Access control / Computer security / User / Collaborative software / Authorization / Group / Operating system / Security / Identity management / Computing

A Group-based Authorization Model for Cooperative Systems Klaas Sikkel GMD-FIT, German National Research Center for Information Technology

Add to Reading List

Source URL: www.ecscw.org

Language: English - Date: 2006-12-04 08:09:23
963Identity / Federated identity / Access control / Security Assertion Markup Language / Shibboleth / Single sign-on / Public key certificate / Information security / Authentication / Security / Identity management / Computer security

Federation Member Declaration

Add to Reading List

Source URL: www.publishingtechnology.com

Language: English - Date: 2014-07-23 10:57:36
964Computing / Data / Computer architecture / Features new to Windows XP / Transmission Control Protocol / Port / Windows Vista

OTOY Client API The OTOY Client is launched from a URL, and supports a number of parameters to support different behaviour. URL Syntax The URL to access the OTOY client is built up as follows:

Add to Reading List

Source URL: aws.otoy.com

Language: English - Date: 2013-11-05 18:11:46
965Multi-factor authentication / Authentication / Password / Security token / Information security / Two-factor authentication / Password manager / Security / Access control / Computer security

Are Passwords Passé? Deployment Strategies for Multifactor Authentication IAM Online – December 10, 2014 Mike Grady, Scalable Privacy Project

Add to Reading List

Source URL: incommonfederation.org

Language: English - Date: 2014-12-10 13:36:21
966Computer security / Access control / Identity management / Operating system / Kernel / Ring / Android / Malware / Google Chrome / Software / Computing / Cloud clients

User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2012-05-22 01:33:56
967Check Point Abra / Security and safety features new to Windows Vista / Computing / Computer network security / Portable Document Format

WhitePaper FileOpen for Corporate Enterprise Rights Management (ERM) Goal: to control access to documents based on user credentials, both inside and outside the corporate firewall. Corporations clearly need to secure pr

Add to Reading List

Source URL: www.actino.com

Language: English - Date: 2013-04-03 09:57:39
968Payment systems / Electronic commerce / Security token / Two-factor authentication / Software token / Embedded systems / Authentication / Online banking / Debit card / Security / Computer security / Access control

Application for DBBL Two Factor Authentication (2FA) Registration Date: D D M M

Add to Reading List

Source URL: ecom1.dutchbanglabank.com

Language: English - Date: 2014-03-24 01:38:00
969Capability-based security / Confused deputy problem / Principle of least privilege / Object-capability model / Ambient authority / File descriptor / Privilege / Filename / Computer security / Security / Access control

CS 261 Scribe Notes Matt Finifter October 2, 2008 Administrative • Homework 2 due Monday 10/6

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:42
970Computer security / Default password / Password / Access control / Security

Outside Activity Report New Employee Benefits Orientation Topics 9Purpose

Add to Reading List

Source URL: www.uc.edu

Language: English - Date: 2011-06-08 08:25:56
UPDATE