Security management

Results: 59084



#Item
411Computer access control / Computer security / Security / Cryptography / CAPTCHA / Password / Challengeresponse authentication / Transaction authentication number / Brute-force attack / Salt / Authentication / Password cracking

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-06-22 08:29:01
412Computer security / Computer access control / Cryptography / Computing / Entrust / Security token / Datacard Group / Authentication / IEEE 802.1X / Smart card / Identity management / Electronic authentication

+entrust.com/enterprise Entrust IdentityGuard for Enterprise

Add to Reading List

Source URL: www.entrustdatacard.com

Language: English - Date: 2016-02-11 14:34:23
413Cryptography / Public key infrastructure / Key management / Public-key cryptography / Transport Layer Security / E-commerce / GlobalSign / Extended Validation Certificate / Certificate authority / Certificate policy / Certification Practice Statement / CA/Browser Forum

GlobalSign CA Certification Practice Statement Date: 2nd May 2016 Version: v8.1

Add to Reading List

Source URL: jp.globalsign.com

Language: English - Date: 2016-05-26 21:37:36
414Security / Office equipment / Paper recycling / Paper shredder / Records management technology / Recycling / Natural environment / Physical universe / Nature

Gold Trail Recycling Ltd. BUSINESS DOCUMENT SHREDDING Confidential - Cost-Effective - Convenient

Add to Reading List

Source URL: www.goldtrail.sfobc.com

Language: English - Date: 2016-02-26 11:25:20
415Physical geography / Water / Earth / Federal Emergency Management Agency / Hydrology / Salisbury metropolitan area / Insurance law / National Flood Insurance Program / United States Department of Homeland Security / Emergency management / Flood insurance rate map / Floodplain

U.S. Department of Homeland Security FEMA Region III One Independence Mall, 6th Floor 615 Chestnut Street Philadelphia, PA

Add to Reading List

Source URL: www.southbethany.org

Language: English - Date: 2016-04-11 14:01:56
416Economy / Finance / Money / Systemic risk / Actuarial science / Security / Economy of the European Union / European Insurance and Occupational Pensions Authority / Solvency II Directive / European System of Financial Supervision / Risk management / European Union law

Ref. AresREQUEST TO EIOPA FOR TECHNICAL ADVICE ON THE REVIEW OF SPECIFIC ITEMS IN THE SOLVENCY II DELEGATED REGULATION (Regulation (EUWith th s mandate to EIOPA, the Commission see

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2016-07-20 08:40:03
417P3P / World Wide Web / Internet privacy / Computing / Privacy / Identity management / Computer security / Cyberspace / CUPS / Privacy policy / HTTP cookie / Medical privacy

A “Nutrition Label” for Privacy Patrick Gage Kelley,* Joanna Bresee,* Lorrie Faith Cranor,* Robert W. Reeder** * Carnegie Mellon University School of Computer Science

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2009-06-17 17:35:23
418Cryptography / Public-key cryptography / Attribute-based encryption / Encryption / ID-based encryption / Personal health record / RSA / Key / Cipher / Data Encryption Standard / Cloud computing security / Identity-based conditional proxy re-encryption

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-07-06 14:15:02
419Cryptography / Public-key cryptography / Public key infrastructure / Key management / Transport Layer Security / Cryptographic protocols / Certificate policy / Certificate authority / Public key certificate / Revocation list / X.509 / Kek

Microsoft Word - KEK-GRID-CPCPSdoc

Add to Reading List

Source URL: gridca.kek.jp

Language: English - Date: 2010-11-01 03:18:34
420Security / Access control / Identity management / Computer security / Computer access control / Authorization / User / XACML

Producing Hook Placements to Enforce Expected Access Control Policies No Author Given No Institute Given Abstract. Many security-sensitive programs manage resources on behalf of mutually distrusting clients. To control

Add to Reading List

Source URL: www.cse.psu.edu

Language: English - Date: 2014-11-18 10:12:45
UPDATE