Searched for: "authentication as a service"
- Security (299)
- Mobility (123)
- Cloud (99)
- Networking (46)
- Software (27)
- Data Management (15)
- Data Centers (14)
- Microsoft (14)
- Hardware (11)
- Big Data (9)
- Cxo (9)
- Developer (8)
- Enterprise Software (8)
- Open Source (8)
- Collaboration (6)
- Project Management (5)
- Storage (4)
- Start-Ups (2)
- After Hours (1)
- Banking (1)
- Google (1)
- It Policies (1)
- Social Enterprise (1)
- Virtualization (1)
About 716 results for "authentication as a service"
Recent TechStars graduate Appbase built what it calls a "Databases as a Service" product to handle database management and optimization for users.
Adding security to Hadoop is challenging because all the interactions do not follow the classic client-server pattern: the file system is partitioned and distributed requiring auth...
Cloud computing is emerging as a prevalent data interactive paradigm to realize users' data remotely stored in an online cloud server. Cloud services provide more benefits for the ...
In this paper, the authors are to provide the dual level security for the key in playfair cipher using modified RSA digital signature scheme. This paper has two phases, in the firs...
Wireless Sensor Network (WSN) has many application such as environment sensing, building safety monitoring, earthquake prediction etc. Security is critical issue in sensor networks...
Ensuring security controls work correctly for large information systems can be taxing. Reduce your stress level by using a PaaS as the testbed for security controls.
Cloud computing is emerging as a prevalent data interactive paradigm to realize users' data remotely stored in an online cloud server. Cloud services provide great conveniences for...
VoIP faces many emerging attacks and threats. Securing SIP based VoIP is a major challenging task, hence confidentiality, integrity, availability, as well as authenticity must be p...
Security is a leading factor for establishing and maintaining customer trust in Mobile Money Services (MMSs). MMSs in Tanzania rely on the use of Personal Identification Number (PI...
Advances in the field of information technology make information security an inseparable part of it. In today's world, electronic mail or e-mail is the one that is most prone to in...