Kerberos

Results: 405



#Item
331Identification / Government / Kerberos / Security / Identity document / Internet Relay Chat

Some Questions and Answers about the new Client Identification ad Verification regulations

Add to Reading List

Source URL: www.nsbs.org

Language: English - Date: 2011-12-16 12:09:21
332Information technology management / Password / Su / Shadow password / Passwd / Secure Shell / Kerberos / Operating system / Unix / System software / System administration / Software

Microsoft Word - CUIT UNIX SOE V1.1.doc

Add to Reading List

Source URL: cuit.columbia.edu

Language: English - Date: 2011-06-30 16:28:35
333Windows Vista / FTP clients / News aggregators / Windows XP / Computer security / Kerberos / Open Vulnerability and Assessment Language / Federal Desktop Core Configuration / Internet Explorer 7 / Microsoft Windows / Software / Computing

Enhancing the FDCC Content Andrew Buttner January 24, 2008 © 2008 The MITRE Corporation. All rights reserved

Add to Reading List

Source URL: nvd.nist.gov

Language: English
334WS-Security / Kerberos / Generic Security Services Application Program Interface / Access token / OASIS / WS-SecurityPolicy / Computing / Computer security / Security

Microsoft Word - wss-v1.1-spec-os-KerberosTokenProfile.doc

Add to Reading List

Source URL: docs.oasis-open.org

Language: English - Date: 2006-10-12 10:25:58
335Computing / Public-key cryptography / Access control / IEEE 802.1X / X.509 / Password / Kerberos / Authentication / Cloud computing / Cryptography / Computer network security / Security

Emerging Applications IoT Authentication email

Add to Reading List

Source URL: www.ieee802.org

Language: English - Date: 2014-07-15 18:59:28
336Structured storage / MongoDB / Database management systems / Shard / Kerberos / Enterprise software / Data management / NoSQL / Distributed computing architecture

MongoDB_Logo_CMYK_Knockout_CoatedStock.eps

Add to Reading List

Source URL: info.mongodb.com

Language: English - Date: 2014-07-26 08:01:21
337Cryptographic protocols / Propositional calculus / Boolean algebra / Classical logic / Kerberos / Modal logic / Public-key cryptography / Yahalom / Burrows–Abadi–Needham logic / Logic / Cryptography / Mathematical logic

A Semantics for a Logic of Authentication (Extended Abstract) Martn Abadi Digital Equipment Corporation

Add to Reading List

Source URL: www.markrtuttle.com

Language: English - Date: 2007-04-26 00:00:00
338Computer security / Data / Internet standards / Internet protocols / Cryptographic protocols / Kerberos / OpenLDAP / Lightweight Directory Access Protocol / Apache Directory / Computing / Computer network security / Directory services

 ­ KrbLDAP ­ A new secure authentication concept Wydział Informatyki Katedra Sieci Komputerowych Specjalizacja: Sieci Komputerowe

Add to Reading List

Source URL: olo.org.pl

Language: English - Date: 2012-02-06 11:15:47
339Software / Network file systems / Network File System / Portmap / Solaris / FreeBSD / Automounter / Kerberos / Port / Computing / System software / Internet protocols

An Overview of NFSv4 An Overview of NFSv4 NFSv4.0, NFSv4.1, pNFS, and proposed NFSv4.2 features June 2012

Add to Reading List

Source URL: snia.org

Language: English - Date: 2012-07-10 17:35:10
340Cloud infrastructure / Hadoop / Apache Hadoop / Cloudera / HBase / Kerberos / Apache Hive / Cloud computing / Centralized computing / Computing

1 Secure Your Hadoop Cluster With Apache Sentry (Incubating) Xuefu Zhang |Software Engineer, Cloudera

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2014-04-04 15:53:41
UPDATE