Listing 1 - 10 of 70 | << page >> |
Sort by
|
Choose an application
Choose an application
The purpose of SECRYPT 2011, the International Conference on Security and Cryptography, is to bring together researchers, mathematicians, engineers and practitioners interested on security aspects related to information and communication Theoretical and practical advances in the fields of cryptography and coding are a key factor in the growth of data communications, data networks and distributed computing In addition to the mathematical theory and practice of cryptography and coding, SECRYPT also focuses.
Computer networks --- Cryptography --- Security measures --- Access control
Choose an application
Passwords are presently the primary method by which users authenticate themselves to computer systems. But passwords are proving less and less capable of protecting systems from abuse. Multifactor authentication (MFA)⁰́₄which combines something you know (e.g., a PIN), something you have (e.g., a token), and/or something you are (e.g., a fingerprint)⁰́₄is increasingly being required. This report investigates why organizations choose to adopt or not adopt MFA⁰́₄and where they choose to use it. The authors reviewed the academic literature and articles in the trade press and conducted structured conversations with selected organizations that use or have contemplated using MFA. They found that the type of organization⁰́₄for example, defense contractor, bank, hospital⁰́₄affected its MFA choices. MFA is mandated for U.S. government agencies, which tend to use PINs and tokens for remote access. Among private users of MFA, tokens that generate one-time passwords, rather than biometrics, predominate. The researchers recommend that the U.S. government develop methodologies by which the costs and benefits of mandating MFA can be evaluated. Guidance by the National Institute of Standards to government agencies may be useful in helping them sort out the various arguments for and against mandating MFA in a given sector.
Computers --- Computer security --- Access control. --- Management.
Choose an application
Computer crimes --- Computers --- Prevention. --- Access control
Choose an application
Government information --- Freedom of information --- Access control --- United States. --- Records and correspondence --- Access control.
Choose an application
Identification cards. --- Computer systems --- Federal government --- Government property --- Public buildings --- Public buildings --- Administrative agencies --- Access control --- Computer network resources --- Access control --- Security measures --- Access control --- Security measures
Choose an application
For those who find themselves in a battle for public records, Access with Attitude: An Advocate's Guide to Freedom of Information in Ohio is an indispensable weapon. First Amendment lawyer David Marburger and investigative journalist Karl Idsvoog have written a simply worded, practical guide on how to take full advantage of Ohio's so-called Sunshine Laws. Journalists, law firms, labor unions, private investigators, genealogists, realty companies, banks, insurers-anyone who regularly needs access to publicly held information-will find this comprehensive and contentious guide to be invaluable.
Public records --- Freedom of information --- Access control --- Law and legislation
Choose an application
Government information --- Public records --- Access control --- United States.
Choose an application
Network neutrality --- Internet --- Internet service providers --- Government policy --- Access control
Choose an application
Mobile communication systems --- Mobile computing --- Internet --- Access control
Listing 1 - 10 of 70 | << page >> |
Sort by
|