Public computer

Results: 14618



#Item
171Public-key cryptography / Resource Public Key Infrastructure / Cryptography / Netnod / Computer security / Vulnerability

Inter-­‐domain  rou.ng  security   Stocktaking,  state-­‐of-­‐the  art,  and   future  perspec.ves   IEPG,  IETF  78,  Maastricht,  The  Netherlands  

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2010-07-25 05:37:06
172Free and open-source software licenses / LaTeX Project Public License / TeX / Copyleft / Computer law / GNU Project / GNU General Public License / LaTeX / Linux kernel / Free content / Copyright law of the United States / Derivative work

The LATEX Project Public License LPPL Version 1.3cCopyright 1999, 2002–2008 LATEX3 Project Everyone is allowed to distribute verbatim copies of this license document, but modification of it is not allowed.

Add to Reading List

Source URL: www.latex-project.org

Language: English - Date: 2016-08-08 13:00:03
173Free and open-source software licenses / Copyleft / GNU Project / Computer law / GNU General Public License / GNU / MIT License / GPL linking exception / License compatibility

General Information PhidgetLab: The Code written by the authors of this project, including the PhidgetPlugin C source code and the corresponding Smalltalk Code is furthermore called PhidgetLab. Phidget C API: The C sourc

Add to Reading List

Source URL: www.hpi.uni-potsdam.de

Language: English - Date: 2016-01-14 07:33:01
174Computer access control / Identity management / Federated identity / Security token / Mobile signature / Password / Authentication / Public key infrastructure / Multi-factor authentication / Mobile identity management / OpenID / Subscriber identity module

Keyhub_Technical_Overview_28

Add to Reading List

Source URL: www.iquestgroup.com

Language: English - Date: 2016-05-13 04:56:07
175Computer access control / Key management / Access control / Public-key cryptography / Identity management / Simple public-key infrastructure / Authorization certificate / Authentication / Public key infrastructure / Delegation / PERMIS / Authorization

Delegation Logic: A Logic-based Approach to Distributed Authorization NINGHUI LI Stanford University BENJAMIN N. GROSOF Massachusetts Institute of Technology

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2002-12-29 15:33:54
176Administration / Information technology management / Information governance / Public records / Content management systems / Records management / Audit / Management system / Information management / Management / Computer security / DIRKS

Check-up 2.0 A tool for assessing your agency’s information and records management Copyright © Commonwealth of Australia 2010

Add to Reading List

Source URL: naa.gov.au

Language: English - Date: 2016-07-18 23:40:26
177Public-key cryptography / Hypertext Transfer Protocol / Computer network security / Public key infrastructure / Internet privacy / HTTP cookie / Email / Computer security

Techniques for Visual Feedback of Security State Tara Whalen and Kori Inkpen Dalhousie University Halifax, NS, Canada {whalen, inkpen}@cs.dal.ca Introduction and Overview

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English
178Computer law / Software licenses / Proprietary software / Application software / Software / GNU General Public License / Open-source software / Computing

BUSINESS CONFIDENTIAL BUSINESS CONFIDENTIAL IPO Fills out this Section

Add to Reading List

Source URL: ipo.lbl.gov

Language: English - Date: 2016-08-11 11:21:38
179Transport Layer Security / Public-key cryptography / Key management / Public key infrastructure / Cryptographic protocols / Online Certificate Status Protocol / Revocation list / Certificate authority / X.509 / OCSP stapling / Revocation / Key

2016 IEEE European Symposium on Security and Privacy PKI Safety Net (PKISN): Addressing the Too-Big-to-Be-Revoked Problem of the TLS Ecosystem Pawel Szalachowski, Laurent Chuat, and Adrian Perrig Department of Computer

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2016-04-19 10:06:03
180Computer access control / E-commerce / Certificate authorities / Public-key cryptography / Federated identity / Authentication / Digital identity / Entrust / Public key certificate / IdenTrust / Peer-to-peer / Identity management

Identity Authentication: Increasing Confidence in Peer-to-Peer Networks IdenTrust B

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2016-05-19 18:52:40
UPDATE