Kerberos

Results: 405



#Item
61Software / Concurrent computing / Hadoop / Apache Hadoop / Cloudera / MapR / Kerberos / RapidMiner / Big data / Computing / Cloud infrastructure / Cloud computing

by Tobias Malbrecht and Zoltan Prekopcsak February 2015 RapidMiner Orange Paper Big Data Security on Hadoop As an increasing number of enterprises move towards production

Add to Reading List

Source URL: rapidminer.com

Language: English - Date: 2015-02-17 10:53:21
62Computer network security / Directory services / Kerberos / Integrated Windows Authentication / Single sign-on / IBM AIX / Unix / Authentication / Active Directory / System software / Software / Computer security

Case Study Quest Assists RotaDyne with the Implementation of a Single, Integrated Authentication Solution Using Vintela Products RotaDyne is one of the largest manufacturers of rollers and related products for printing

Add to Reading List

Source URL: ppn.com.hk

Language: English - Date: 2012-09-29 00:21:10
63Computer network security / Directory services / Federated identity / Single sign-on / Integrated Windows Authentication / Kerberos / Active Directory / Unix / Pluggable authentication module / Software / System software / Computing

DATASHEET Authentication Services Compliance | Single Sign-on | Simplifying Identity Management Quest Authentication Services provides enterprise-wide access, authentication and authorization for Unix, Linux, and Mac sy

Add to Reading List

Source URL: ppn.com.hk

Language: English - Date: 2012-09-29 00:21:17
64Computing / Cyberwarfare / Single sign-on / Windows / Computer network security / Computer security / Kerberos

PDF Document

Add to Reading List

Source URL: www.secure-endpoints.com

Language: English - Date: 2007-05-10 16:58:34
65Computer security / Computer network security / Authentication protocol / Authentication / Kerberos / Cryptography / Cryptographic protocols / Security

Demarcation of Security in Entity Authentication Protocols Naveed Ahmed & Christian D. Jensen DTU Informatics, Denmark July 6, 2011

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2011-07-25 05:29:53
66System software / Network File System / Lustre / OpenAFS / HP-UX / Kerberos / Solaris / Server Message Block / Generic Security Services Application Program Interface / Network file systems / Computing / Software

OpenAFS Road Map Discussion - Best Practice Workshop 2007

Add to Reading List

Source URL: www.secure-endpoints.com

Language: English - Date: 2007-11-06 16:55:48
67Cyberwarfare / Wireless security / Virtual private network / Network security / Secure Shell / RADIUS / Transport Layer Security / Cisco Systems VPN Client / Kerberos / Computer network security / Computing / Internet

University of Michigan NETWORK WORKING GROUP Recommendation for Wireless Network Security At the University of Michigan

Add to Reading List

Source URL: www.itcom.itd.umich.edu

Language: English - Date: 2007-11-15 14:00:23
68Windows Vista / Windows NT / Computer network security / Kerberos / User Account Control / Microsoft Management Console / Control panel / Microsoft Windows / Software / System software

KFW and OAFW Futures - Best Practice Workshop 2007

Add to Reading List

Source URL: www.secure-endpoints.com

Language: English - Date: 2007-05-10 20:51:04
69Computer security / Kerberos / Authentication server / Ticket Granting Ticket / Challenge-response authentication / Authentication / Password / CAPTCHA / Key distribution center / Computer network security / Computing / Cryptography

Stayin’ Alive: Aliveness as an alternative to authentication Jonathan Anderson and Robert N M Watson University of Cambridge Computer Laboratory {jonathan.anderson,robert.watson}@cl.cam.ac.uk

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2012-11-30 15:52:29
70Public-key cryptography / Key management / Kerberos / Virtual synchrony / Cryptography / Cryptographic protocols / Computer network security

The Cost of Adding Security Services to Group Communication Systems Cristina Nita-Rotaru Advisor: Dr. Yair Amir Submitted in partial fulfillment of the Ph.D. qualifiers Department of Computer Science

Add to Reading List

Source URL: www.cnds.jhu.edu

Language: English - Date: 2013-09-18 16:37:35
UPDATE