Computer access control

Results: 4654



#Item
971Public-key cryptography / Computer network security / Capability-based security / Tahoe Least-Authority Filesystem / Key management / Internet privacy / Computer security / Authentication / Cloud computing / Cryptography / Security / Access control

Tamias: a privacy aware distributed storage Jean Lorchat, Cristel Pelsser, Randy Bush, Keiichi Shima Internet Initiative Japan, Inc. {jean,cristel,randy,keiichi}@iijlab.net 1

Add to Reading List

Source URL: member.wide.ad.jp

Language: English - Date: 2011-02-12 20:29:24
972Wireless networking / Computing / Content-control software / Fortinet / Networking hardware / IEEE 802.11 / Wireless security / Wi-Fi / MIMO / Technology / Computer network security / Electronics

FortiAP Wireless Access Points TM Integrated Wireless Security and Access The Need for a Fortified Wireless LAN Enterprises are looking to increase productivity through uninterrupted access to

Add to Reading List

Source URL: corex.at

Language: English - Date: 2015-05-13 12:09:08
973Computer security / Login / Federated identity / Privileged password management / Self-service password reset / Access control / Security / Password

WSSP Troubleshooting Guide Website Edition 1

Add to Reading List

Source URL: myutilities-eaccount.utilitiesbp.com

Language: English - Date: 2012-05-07 05:10:36
974Login / Computer security / Spamming / Identity management systems / Password / Security / Access control

PERKINS WEB PORTAL   2015 User Guide

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2015-02-11 01:17:29
975Computer network security / Information security / Security controls / Vulnerability / Threat / Authentication / Attack / Access control / Authorization / Security / Computer security / Cyberwarfare

National Risk Management Policy and Framework for National Security Systems

Add to Reading List

Source URL: www.ncsc.gov

Language: English - Date: 2012-05-15 07:38:22
976FOAF / Role-based access control / Distributed Access Control System / Lattice-based access control / Password / Semantic Web / PERMIS / Authentication / Security / Access control / Computer security

R O L E A N D L O C AT I O N B A S E D A C C E S S C O N T R O L USING SEMANTIC WEB TECHNOLOGIES sandro cirulli student number: supervisor: professor david duce module: p00998 - msc dissertation

Add to Reading List

Source URL: sandrocirulli.net

Language: English - Date: 2015-05-17 14:55:32
977Security / Computer security / Password / Login / Access control

Microsoft Word - CAR_User_Guide_2014.docx

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2014-11-25 03:35:23
978Login / Computer security / Computer crimes / Social engineering / Apple ID / Password / Access control / Security

Microsoft Word - Registration Instructions

Add to Reading List

Source URL: www.nwhospital.org

Language: English - Date: 2014-06-06 15:04:07
979Password / Cryptographic software / Identity management / Password strength / Privileged password management / Security / Access control / Computer security

Microsoft Word - 02_Passwords

Add to Reading List

Source URL: dfsm9194vna0o.cloudfront.net

Language: English - Date: 2015-05-19 12:55:46
980Access control / Identity management / Password / Salt / Passphrase / John the Ripper / Crypt / Security token / OTPW / Security / Computer security / Cryptography

The Tangled Web of Password Reuse Anupam Das∗ , Joseph Bonneau† , Matthew Caesar∗ , Nikita Borisov∗ and XiaoFeng Wang‡ ∗ University of Illinois at Urbana-Champaign {das17, caesar, nikita}@illinois.edu

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2013-12-13 12:04:32
UPDATE