Searched for: "context dependent authentication and access control"
- Microsoft (14)
- Data Centers (8)
- Security (7)
- Enterprise Software (4)
- Networking (4)
- Banking (3)
- Data Management (3)
- Software (3)
- Hardware (2)
- Open Source (2)
- Project Management (2)
- Apple (1)
- Big Data (1)
- Cloud (1)
- Developer (1)
- E-Commerce (1)
- Google (1)
- Mobility (1)
- Printers (1)
- Social Enterprise (1)
About 61 results for "context dependent authentication and access control"
Jesus Vigo provides steps and best practices for managing computers and users utilizing Apple Remote Desktop.
Private school’s Chromebook program explains why Google’s laptops have captured nearly 20% of the educational market
Kentucky Country Day, an independent private school, recently began requiring Chromebooks for their middle schoolers. What started as an R&D experiment has yielded some striking re...
To provide secure and efficient access control methods in cloud computing environments, many system models have been proposed that employ attribute-based encryption and proxy re-en...
Authentication is a first phase in standard Kerberos which is password dependent. It makes the protocol vulnerable from attackers for password hacking using offline or online attac...
With social media now a mainstream communication tool, there's concern about to collect and preserve its content in the event of eDiscovery. Here are some options to consider.
The performance evaluation have their place in wireless network research, the current and future applications of the ad hoc networks have forced the research community to look at d...
When you work daily on the small parts that make up a system, it's easy to lose track of the big picture. Marc Schiller talks about a new initiative that is catching on that wouldn...
Taking steps to eliminate ambiguity when discussing the design and security of an access control system will ensure that the right steps are being taken to strengthen security.
Windows Server 2008 has many of the same utilities as Windows Server 2003, but there are some changes. Here's a look at what you'll find in Windows Server 2008's version of Active ...
There's more to selecting an enterprise second-factor authentication method than meets the retina scanner. As with any IT project, each dollar spent must produce business value. Wi...