User identifier

Results: 147



#Item
11

Build a matching service What is a matching service? A matching service matches a user’s assured identity to a local identifier in the service’s records, to allow them to use the service. Because there’s no unique

Add to Reading List

Source URL: alphagov.github.io

Language: English - Date: 2015-06-08 12:02:04
    12Telecommunications engineering / Identification / UIMID / Mobile equipment identifier / Electronic serial number / CDMA Subscriber Identity Module / Removable User Identity Module / International Mobile Subscriber Identity / Mobile identification number / Technology / Mobile technology / Wireless

    CDG Document 158 Version 2.1: MEID and EUIMID Migration

    Add to Reading List

    Source URL: www.cdg.org

    Language: English - Date: 2011-02-02 14:04:57
    13Password / Group identifier / User identifier / Shadow password / Passwd / Filesystem permissions / Unix security / Unix / System software / Software

    Rating Against Industry Average X

    Add to Reading List

    Source URL: www.sekchek.com

    Language: English - Date: 2013-11-13 04:19:14
    14Computing / User identifier / Setuid / Group identifier / Principle of least privilege / Filesystem permissions / Privilege / Superuser / Operating system / System software / Software / Unix

    UNIX Basics WENDY GROSSMAN by Peter Collinson, Hillside Systems

    Add to Reading List

    Source URL: www.hillside.co.uk

    Language: English - Date: 2001-11-27 10:12:20
    15Software / User identifier / Group identifier / Process identifier / Fork / Privilege / Id / Kill / Exit / Process / Computing / System software

    A Short Course On Systems Administration and Security Under Unix by Dr. Frederick B. Cohen

    Add to Reading List

    Source URL: all.net

    Language: English - Date: 2010-12-06 01:12:56
    16Software / User identifier / Group identifier / Setuid / Chmod / Filesystem permissions / Privilege separation / Superuser / Privilege / Unix / Computing / System software

    writing_secure_privileged_programs-PRINTABLE

    Add to Reading List

    Source URL: man7.org

    Language: English - Date: 2015-05-07 06:42:59
    17Chroot / Kernel / Capability-based security / Operating system / Unix / Privilege escalation / Microkernel / User identifier / Principle of least privilege / System software / Computer security / Software

    Make Least Privilege a Right (Not a Privilege) Maxwell Krohn∗ , Petros Efstathopoulos† , Cliff Frey∗ , Frans Kaashoek∗ , Eddie Kohler† , David Mazi`eres‡ , Robert Morris∗ , Michelle Osborne‡ , Steve VanDe

    Add to Reading List

    Source URL: www.scs.stanford.edu

    Language: English - Date: 2005-05-06 16:45:01
    18VoIP phone / .mobi / Universal Serial Bus / Identifier / Device file / Laptop / Data / Computing / Computer hardware / Namespace

    User-Relative Names for Globally Connected Personal Devices Bryan Ford, Jacob Strauss, Chris Lesniewski-Laas, Sean Rhea, Frans Kaashoek, and Robert Morris Massachusetts Institute of Technology 1.

    Add to Reading List

    Source URL: pdos.csail.mit.edu

    Language: English - Date: 2015-04-29 10:31:15
    19Technical communication tools / XSLT / Ajax / XQuery / DocBook / XSL / XML editor / Fragment identifier / Java API for XML Processing / Computing / Markup languages / Functional languages

    Multi-user interaction using client-side XSLT

    Add to Reading List

    Source URL: www.saxonica.com

    Language: English - Date: 2013-06-13 12:43:48
    20Videotelephony / Mobile technology / Instant messaging / IP Multimedia Subsystem / Multimedia / Network architecture / Watcher / Presence information / Uniform resource identifier / Technology / Electronic engineering / Electronics

    Presence feature subscribing to Resource List (IMS Presence Subscription to a Resource List) Watcher UE Watcher IMS Network Presentity IMS Networks Watcher User Watcher

    Add to Reading List

    Source URL: www.eventhelix.com

    Language: English - Date: 2015-03-03 14:19:07
    UPDATE