Identity management

Results: 13318



#Item
241Data mining / Identity / Identity management / Profiling / Jisc / Computing / Information technology / Education

JUSP USE CASE Understanding your usage in a broader context It’s useful to view your institution’s usage in JUSP, but many institutions want to understand what that usage means in a broader context. How does your usa

Add to Reading List

Source URL: jusp.mimas.ac.uk

Language: English - Date: 2015-07-27 06:18:49
242Series / Password / Security / Prevention / Safety / Identity management systems / Password strength

PASSWORD RULES (from THE MANUSCRIPT) by Michael Stephen Fuchs “Good afternoon, Mr. Luther,” said the crewcut man behind the desk. Stanley Luther flashed an ID absently as he strode to the single door in the room,

Add to Reading List

Source URL: www.the-manuscript.com

Language: English - Date: 2007-12-03 06:46:56
243Digital rights / Human rights / Identity management / Law / Privacy / Internet privacy / Medical privacy / Government / Politics / Privacy Commissioner

Privacy, Civil Rights, and Civil Liberties Policy Development Template for State, Local, and Tribal Justice Entities: Policy Review Checklist

Add to Reading List

Source URL: www.it.ojp.gov

Language: English
244Computer access control / Computer security / Cryptography / Identity management / Password / Security / Challengeresponse authentication / Crypt / Security hacker / Password strength / Password policy

MISSION: To broaden the knowledge and promote values necessary for Maine’s local and county government Administrators to better serve their communities. A publication of the Maine Town, City

Add to Reading List

Source URL: www.mtcma.org

Language: English - Date: 2015-07-02 11:09:14
245Computing / Computer security / Security engineering / SOA Security / Web services / WS-Security / WS-Policy / Identity management / XML appliance

issued buffer overrun validated

Add to Reading List

Source URL: www.soaschool.com

Language: English - Date: 2013-01-08 15:18:19
246Privacy / Internet privacy / Identity management / Law / Computing / Personally identifiable information / Government / Medical privacy / Politics / In re Gateway Learning Corp. / Privacy concerns with social networking services

American Window Systems Privacy Policy This privacy policy discloses the privacy practices for www.EnergyWindowSolutions.com. This privacy policy applies solely to information collected by this web site. It will notify y

Add to Reading List

Source URL: www.americanwindowsystems.com

Language: English - Date: 2015-06-22 13:41:15
247Identity management / Data security / Law / Privacy / Neelie Kroes / Computing / Personal /  Inc. / Medical privacy / Information technology / Politics of the Netherlands / Fraunhofer Institute for Open Communication Systems

Exclusive panel on Identity Management, Privacy and Security Achieves Success at the World Economic Forum Meeting in Davos 2014 Geneva 28th January, 2014 – At the roundtable on Addressing Identity of People and Things,

Add to Reading List

Source URL: www.iked.org

Language: English - Date: 2014-01-30 13:49:03
248Cryptography / E-commerce / Key management / Public key certificate / Public key infrastructure / Public-key cryptography / Identity documents

OFFICE OF ELECTIONS - JIM McCAULEY CERTIFIED PROOF OF REGISTRATION APPLICATION The application for the Certified Proof of Registration must be completed by the person applying for the certificate. The cost for the Certif

Add to Reading List

Source URL: placerelections.com

Language: English - Date: 2014-08-26 17:39:46
249Credential / Identity management / Knowledge / Professional certification / Medical transcription / Health / Professional studies / Child Development Associate / Draft:Program Management Professional

Comparison of the Old and Revised CDA Renewal Process (EffectiveOLD CDA RENEWAL PROCESS Step 1 Step 2

Add to Reading List

Source URL: www.cdacouncil.org

Language: English - Date: 2016-02-19 11:19:02
250Computer access control / Cryptography / Computer security / Identity management / Password / Security / One-time password / Challengeresponse authentication / Crypt / Key derivation function / Password strength / Password fatigue

Mercury: Recovering Forgotten Passwords Using Personal Devices⋆ Mohammad Mannan1 , David Barrera2, Carson Brown2, David Lie1 , and Paul C. van Oorschot2 1

Add to Reading List

Source URL: www.eecg.toronto.edu

Language: English - Date: 2010-12-21 12:01:07
UPDATE