Extended Access Control

Results: 52



#Item
11Earth / Communication / KazakhTelecom / .kz / Internet in Tajikistan / Internet in Azerbaijan / Communications in Kazakhstan / Internet in Kazakhstan / Kazakhstan

Kazakhstan The Kazakh government has extended its control over the Internet, even as it seeks to liberalize the telecommunications market and position itself as a major IT power in the region. The state uses its signific

Add to Reading List

Source URL: www.access-controlled.net

Language: English - Date: 2012-08-10 17:13:29
12Computer display standards / Display Data Channel / Universal Serial Bus / ACCESS.bus / Human interface device / Extended display identification data / Monitor Control Command Set / USB human interface device class / DisplayPort / Computer hardware / VESA / USB

USB Monitor Control Class Specification Revision 1.0 January 5, 1998 USB Monitor Control Class Specification

Add to Reading List

Source URL: www.usb.org

Language: English - Date: 2014-09-03 16:00:32
13Identity management / Cryptography / Password / One-time password / Security token / Salt / Phishing / Password strength / Password policy / Security / Computer security / Access control

TwoKind Authentication: Protecting Private Information in Untrustworthy Environments (Extended Version) Katelin Bailey, Apu Kapadia, Linden Vongsathorn, Sean W. Smith Dartmouth Computer Science Technical Report TR2008-63

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2008-08-28 10:16:12
14Computer display standards / Display Data Channel / Universal Serial Bus / ACCESS.bus / Human interface device / Extended display identification data / Monitor Control Command Set / USB human interface device class / DisplayPort / Computer hardware / VESA / USB

USB Monitor Control Class Specification Revision 1.0 January 5, 1998 USB Monitor Control Class Specification

Add to Reading List

Source URL: www.usb.org

Language: English - Date: 2013-12-18 19:25:24
15Email authentication / Spam filtering / Internet standards / Cross-platform software / Exim / Extended SMTP / DomainKeys Identified Mail / Access control list / SMTP Authentication / Email / Computer-mediated communication / Computing

Specification of the Exim Mail Transfer Agent Exim Maintainers Specification of the Exim Mail Transfer Agent Author: Exim Maintainers

Add to Reading List

Source URL: www.no.exim.org

Language: English - Date: 2015-01-12 10:13:04
16National Security Agency / Security-Enhanced Linux / Mandatory access control / Access control / Linux Security Modules / Extended file attributes / Linux kernel / Fedora / Debian / Software / System software / Computer security

SELinux Quick Start Guide SELinux Quick Start Guide Revision History Revision $Revision: 1.1 $ $Date: [removed]:21:26 $ Revised by: pd

Add to Reading List

Source URL: www.engardelinux.org

Language: English - Date: 2006-01-03 14:54:00
17Incident management / Computing / Computer security / Password / Incident commander / Access control / Email / EAuthentication / System administrator / Public safety / Emergency management / Firefighting in the United States

SOUTHERN AREA INTERAGENCY INCIDENT MANAGEMENT ANNOUNCEMENT/APPLICATION WEBSITE ANNOUNCEMENT CLOSES: Extended to November 1, 2013 OBJECTIVES: To build and maintain teams of highly qualified and motivated specialists who a

Add to Reading List

Source URL: gacc.nifc.gov

Language: English - Date: 2015-02-18 01:16:54
18Email authentication / Spam filtering / Internet standards / Cross-platform software / Exim / Extended SMTP / DomainKeys Identified Mail / Access control list / SMTP Authentication / Email / Computer-mediated communication / Computing

Specification of the Exim Mail Transfer Agent Exim Maintainers Specification of the Exim Mail Transfer Agent Author: Exim Maintainers

Add to Reading List

Source URL: exim.org

Language: English - Date: 2015-01-12 10:13:04
19Computer network security / Access control / Privilege / Superuser / Capability-based security / Threat / Operating system / Ring / Kernel / Computer security / Security / Cyberwarfare

In Foundations of Data Organization, eds. W. Litwin and H.-J. Shek. Springer, 1990, pp[removed]Preprint) ITOSS: An Integrated Toolkit For Operating System Security.1 (Extended Abstract) Michael Rabin

Add to Reading List

Source URL: tygar.net

Language: English - Date: 2006-03-31 18:45:08
20Applied mathematics / Credential / Proof of knowledge / Zero-knowledge proof / Access control / NP / IP / Model theory / Cryptographic protocols / Identity management / Security

This is the full version of an extended abstract published in ACM CCS[removed]Posted as Report[removed]on 19 August 2013; revised 8 September[removed]Algebraic MACs and Keyed-Verification Anonymous Credentials Melissa Chase

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2014-09-16 08:51:21
UPDATE