Identity management

Results: 13318



#Item
161P3P / World Wide Web / Internet privacy / Computing / Privacy / Identity management / Computer security / Cyberspace / CUPS / Privacy policy / HTTP cookie / Medical privacy

A “Nutrition Label” for Privacy Patrick Gage Kelley,* Joanna Bresee,* Lorrie Faith Cranor,* Robert W. Reeder** * Carnegie Mellon University School of Computer Science

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2009-06-17 17:35:23
162Cryptography / Public-key cryptography / Attribute-based encryption / Encryption / ID-based encryption / Personal health record / RSA / Key / Cipher / Data Encryption Standard / Cloud computing security / Identity-based conditional proxy re-encryption

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-07-06 14:15:02
163Security / Access control / Identity management / Computer security / Computer access control / Authorization / User / XACML

Producing Hook Placements to Enforce Expected Access Control Policies No Author Given No Institute Given Abstract. Many security-sensitive programs manage resources on behalf of mutually distrusting clients. To control

Add to Reading List

Source URL: www.cse.psu.edu

Language: English - Date: 2014-11-18 10:12:45
164Security / Computer security / Computing / Identity management / Privacy / Identity documents / Computer access control / Internet privacy / Personally identifiable information / United States Postal Service / HTTP cookie / Credit card

Microsoft Word - privacy_policy

Add to Reading List

Source URL: hotelnorthampton.com

Language: English - Date: 2012-11-30 09:33:52
165Identity management / Computer access control / FIPS 201 / Standards / Presidential directive / Cryptography / Authentication / Credential / Interoperability / Computer security / Engineering

Identity Management Focuses on Credentialing HSPD-12 Will Serve as a Unifier for Agencies Security Inc. of Redwood City, Calif., 59 percent of system integrators (SIs) surveyed see the lack of

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2012-07-10 20:41:46
166Digital rights / Human rights / Identity management / Law / Privacy / Internet privacy / Data security / Information privacy / Medical privacy / Politics / Government

Engendering Trust: Privacy Policies and Signatures Joshua B. Gross, Jessica Sheffield, Alice Anderson, and Nan Yu The Pennsylvania State University University Park, PA 16802 , (jessicas, aea145, nxy906

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-06-01 23:42:33
167Privacy / Identity documents / Identity management / Data security / Law / Personally identifiable information / Internet privacy / Information privacy / REAL ID Act / Anonymity / Medical privacy / Pseudonym

Unlinking Private Data Alex VaynbergYale University Sensitive Information in the Wired World

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2006-05-19 11:28:28
168Internet privacy / Digital media / Social networking services / Identity management / Virtual communities / Computing / HTTP cookie / User-generated content / Privacy / Directive on Privacy and Electronic Communications

Microsoft Word - TERM & CONDITIONS SF.docx

Add to Reading List

Source URL: www.ruinartnetwork.com

Language: English - Date: 2016-02-24 12:29:24
169Affirmative action / Identity politics / Biology / Human resource management / Multiculturalism / Population genetics / Diversity / Biodiversity / Business / Politics

Diversity Advocate Checklist The primary role of the Diversity Advocate is to be an advocate for diversity as a core component of excellence in the search process. The Diversity Advocate must be identified on the search

Add to Reading List

Source URL: diversity.illinois.edu

Language: English - Date: 2015-11-02 11:38:08
170The Work Number / Immigration to the United States / Security / Check verification service / Identity management / Systematic Alien Verification for Entitlements

Verification of Employment and Income The University of California, Irvine uses The Work Number® to complete verifications of employment and income. The Work Number® is an automated service that will allow you to recei

Add to Reading List

Source URL: www.accounting.uci.edu

Language: English - Date: 2016-05-18 19:48:15
UPDATE