Control system security

Results: 2384



#Item
61Computer access control / Computer security / Computing / Electronic authentication / Security token / Authentication / Multi-factor authentication / OpenID / RSA SecurID / Mutual authentication / OAuth / SQRL

Bring Your Own Device For Authentication (BYOD4A) – The Xign–System Norbert Pohlmann  Markus Hertlein  Pascal Manaras Institute for Internet-Security Westphalian University of Applied Sciences {pohlmann | hertl

Add to Reading List

Source URL: www.xignsys.com

Language: English - Date: 2016-03-13 15:17:18
62Software / System software / Computer architecture / Access control / POSIX / Unix / System calls / Sandbox / Capability-based security / File descriptor / Mandatory access control / Unix domain socket

fig-capsicum-processes.graffle

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-03-09 05:43:31
63Computer access control / Access control / Prevention / Password / Security / User / Login

How to Access NAVIS SPARCS N4 - Brokers & Hauliers Welcome to the Port of Port of Spain new container terminal system Navis SPARCS N4. Brokers and Hauliers will have access to more information and greater interaction wit

Add to Reading List

Source URL: www.patnt.com

Language: English - Date: 2012-05-14 12:57:11
64Security / Cryptography / Identification / Access control / Biometrics / Surveillance / Computer access control / Authentication

Biometric Attendance Authentication System (Employee User Manual) 1. Dashboard 1.1 Organization: Total Organization registered in the system with their details. 1.2 Registered Employees: Organization wise Registered Empl

Add to Reading List

Source URL: surveyofindia.attendance.gov.in

Language: English - Date: 2015-02-20 06:43:35
65Identity management / Computer access control / Computer security / Identity / Electronic identification / Authentication / Mobile signature / Recommender system / Multi-factor authentication / Digital identity / Privacy

Microsoft Word - SSEDIC Outcomes Y3 WP6_3v1 6.docx

Add to Reading List

Source URL: www.eid-ssedic.eu

Language: English - Date: 2014-06-09 09:30:04
66Country code top-level domains / Internet Standards / Internet protocols / Domain name system / DNSSEC / Domain Name System Security Extensions / Internet Assigned Numbers Authority / Internet Engineering Task Force / .re / Internet Engineering Steering Group / Request for Comments / Transmission Control Protocol

IANA Department Plenary Report Michelle Cotton | IETF-94, Yokohama | November 2015 Processing IETF Related Requests A look over the past 12 months (October 2014-September 2015)*

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2015-11-02 07:03:03
67Data security / Guard / Transmission Control Protocol / Network packet / Computer networking

Introduction to the Guardol Language and Verification System David Hardin Trusted Systems Group Rockwell Collins Advanced Technology Center

Add to Reading List

Source URL: fm.csl.sri.com

Language: English - Date: 2011-12-15 18:21:31
68Alarms / Security alarm / Security / Alarm device / False alarm / Alarm monitoring center / Sheriffs in the United States / Fire alarm system / Manual fire alarm activation

HUBBARD COUNTY ORDINANCE NO. 29 An Ordinance regulating alarm monitoring control systems and alarm system permits. The County Board of Commissioners of the County of Hubbard, State of Minnesota, does hereby ordain as fol

Add to Reading List

Source URL: co.hubbard.mn.us

Language: English - Date: 2007-03-04 13:49:00
69Computer access control / Identity management / Password / Security / Login / User

Southern Arkansas University Tech’s Online Classroom is moving to a new Learning Management System, Brightspace. Brightspace is an easy, flexible, and smart learning platform that goes beyond the one-size-fits-all Lear

Add to Reading List

Source URL: www.sautech.edu

Language: English - Date: 2016-08-11 09:17:10
70Electric power / Electrical engineering / Electric power transmission / Power-flow study / Flexible AC transmission system / Fault / Nodal admittance matrix / Capacitor / Mains electricity / Static VAR compensator / Distribution management system

“Incorporation of N-1 Security into Optimal Power Flow for FACTS Control” Gabriela Glanzmann, Göran Andersson Important notice Copyright and all rights in this work are retained by the authors. This material may not

Add to Reading List

Source URL: www.eeh.ee.ethz.ch

Language: English - Date: 2008-11-28 06:49:48
UPDATE