Security token

Results: 1367



#Item
951SMS / Text messaging / Transaction authentication number / Password / Access token / User / Electronic commerce / Identity management / Technology / Mobile technology / Computer security

Security Management System MHPD Module 1

Add to Reading List

Source URL: omh.ny.gov

Language: English - Date: 2011-01-27 11:50:41
952Social psychology / Persecution / Bullying / Human behavior / Access token / Computer security / Cyber-bullying / Token coin / Ethics / Abuse / Behavior

Sample Rubrics for Positive Encouragement for Active Bystanders Grades 1-6 Behavior Harassment or Considerations Severe Physical

Add to Reading List

Source URL: www.k12connections.iptv.org

Language: English - Date: 2008-02-27 10:19:48
953Computer security / System software / Windows CardSpace / Information Card / OpenID / Security Assertion Markup Language / Identity provider / Security token / Active Directory Federation Services / Federated identity / Identity / Identity management

“Geneva” Claims Based Access Platform Beta 1 Datasheet Microsoft Identity and Access solutions are a set of platform technologies and products designed to help organizations manage user identities and associated acc

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2008-10-20 12:56:11
954Identity management systems / Federated identity / Identity management / Security Assertion Markup Language / Internet standards / SAML 2.0 / Access token / Security token / Shibboleth / Computing / System software / Computer security

Meteor 4 Token Provider Implementation Guide Version 1.2 Contributors: Richard Allen

Add to Reading List

Source URL: www.meteornetwork.org

Language: English - Date: 2013-05-09 10:14:08
955Computing / Public safety / Email / System administration / Password / Computer network security / University of Texas–Pan American / Information security / Security token / Security / Crime prevention / National security

INFORMATION RESOURCES ACCEPTABLE USE POLICY

Add to Reading List

Source URL: www.utpa.edu

Language: English - Date: 2014-05-06 21:01:17
956Security / Computing / Information / Metadata / Open Archives Initiative Protocol for Metadata Harvesting / Open access / Access token / Authentication / User / Archival science / Digital libraries / Internet protocols

Requester Information Name: E-Mail: Position:

Add to Reading List

Source URL: ands.org.au

Language: English - Date: 2011-09-25 21:47:49
957Identity management / Electronic authentication / Federated identity / Two-factor authentication / Security token / Authentication / Password / Access token / One-time password / Security / Computer security / Access control

NIST Special Publication[removed]

Add to Reading List

Source URL: gpo.gov

Language: English - Date: 2011-01-06 14:07:16
958Two-factor authentication / Multi-factor authentication / Single sign-on / Authentication / Password / Information security / Phishing / Security token / Security / Computer security / Access control

IAM Online Multifactor Authentication in Higher Education Tuesday, December 6, 2011 – 3 p.m. ET Steven Burke, Federal Student Aid, US Dept. of Education Shilen Patel, Senior IT Analyst, Duke University Miguel Soldi, In

Add to Reading List

Source URL: www.incommon.org

Language: English - Date: 2011-12-06 15:07:19
959Access control / Password / Access token / Authentication / Login / Security token / Logical security / Security / Cryptography / Two-factor authentication

The New York State Office of Mental Health uses an “adaptive authentication” process to secure the login and access to some sensitive systems. What is Adaptive Authentication? Adaptive authentication provides two-fac

Add to Reading List

Source URL: omh.ny.gov

Language: English - Date: 2011-10-13 14:14:16
960Cyberwarfare / WS-Security / Cryptographic nonce / Password / Replay attack / Cryptographic hash function / Crypt / OASIS / Digest access authentication / Cryptography / Computing / Computer security

Microsoft Word - oasis[removed]wss-username-token-profile-1.0.doc

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2004-03-16 19:21:06
UPDATE