Control system security

Results: 2384



#Item
181

2013 IEEE Security and Privacy Workshops How Usage Control and Provenance Tracking Get Together - A Data Protection Perspective Christoph Bier Fraunhofer Institute of Optronics, System Technologies and Image Exploitatio

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2013-05-05 16:04:42
    182

    About us: Finmeccanica Centralized Command & Control System Security Integration Paris, 27 May 2014

    Add to Reading List

    Source URL: www.protectrail.eu

    Language: Italian - Date: 2014-07-01 02:55:34
      183

      CONTROL YOUR HOME FROM ACROSS THE ROOM OR ACROSS THE WORLD Remotely arm and disarm your Guardian security system using your smartphone, tablet or PC. Receive text and email notifications when children,

      Add to Reading List

      Source URL: www.guardianprotection.com

      Language: English - Date: 2014-09-22 08:54:23
        184Computer security / Password / Single sign-on / Login / DreamSpark Premium / Federated identity / Access control / Security

        2010 No2 University Makes Resetting Passwords Easy Roskilde University controls staff and student access to IT systems via the national digital identity solution which WAYF is connected to. The system lets users reset pa

        Add to Reading List

        Source URL: wayf.dk

        Language: English - Date: 2012-04-24 06:59:18
        185European Rail Traffic Management System / Train protection systems / European Train Control System / Infrabel / National Security Agency / National Railway Company of Belgium / Transport / Land transport / Rail transport in Europe

        2013 Belgian Safety Authority ANNUAL REPORT Department for Railway Safety and Interoperability (FPS Mobilit y and Transport)

        Add to Reading List

        Source URL: www.mobilit.belgium.be

        Language: English - Date: 2014-10-17 07:48:31
        186Computing / Internet Assigned Numbers Authority / Domain Name System Security Extensions / Request for Comments / Internet Draft / Internet Engineering Steering Group / Internet Engineering Task Force / Transmission Control Protocol / Internet / Internet standards / Internet governance

        IANA Plenary Report Michelle Cotton Manager, IANA Services ICANN July 2012 IETF-84, Vancouver

        Add to Reading List

        Source URL: iaoc.ietf.org

        Language: English - Date: 2013-04-23 17:49:34
        187Access control / Computer security / User / Collaborative software / Authorization / Group / Operating system / Security / Identity management / Computing

        A Group-based Authorization Model for Cooperative Systems Klaas Sikkel GMD-FIT, German National Research Center for Information Technology

        Add to Reading List

        Source URL: www.ecscw.org

        Language: English - Date: 2006-12-04 08:09:23
        188Management / Systemically Important Payment Systems / Financial economics / Security / Internal control / Risk management / Law / Systemic risk / International Organization of Securities Commissions / Financial regulation / Economics / Business

        WESTERN HEMISPHERE PAYMENTS AND SECURITIES SETTLEMENT FORUM WORKING GROUP ON PAYMENT SYSTEM ISSUES OF LATIN AMERICA AND THE CARIBBEAN (WGPS-LAC) The CPSS-IOSCO Principles: A Latin American and Caribbean

        Add to Reading List

        Source URL: www.forodepagos.org

        Language: English - Date: 2014-12-08 12:41:20
        189Medeco / Roanoke County /  Virginia / Key / Physical security / Locksmithing / Security / Public safety

        A LOCKING SYSTEM IS ONLY AS GOOD AS ITS KEY CONTROL. Controlled Duplication: The Key Issue in High Security

        Add to Reading List

        Source URL: www.medeco.com

        Language: English - Date: 2014-08-01 13:43:40
        190Computer security / Access control / Identity management / Operating system / Kernel / Ring / Android / Malware / Google Chrome / Software / Computing / Cloud clients

        User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems

        Add to Reading List

        Source URL: ieee-security.org

        Language: English - Date: 2012-05-22 01:33:56
        UPDATE