Computer access control
In computer security, general access control includes authorization, authentication, access approval, and audit. A more narrow definition of access control would cover only access approval, whereby th...
Beware of ads that use inaudible sound to link your phone, TV, tablet, and PC
Privacy advocates are warning federal authorities of a new threat that uses inaudible, high-frequency sounds to surreptitiously track a person's online behavior across a range of devices, including ph...
Google Says Too Many People Use 'Pizza' To Answer Security Questions
In fact, stop using security questions at all. We all love pizza, but that doesn’t mean you should be using it as a way to keep your data safe online. In a new research paper, Google staffers found t...
The Password Is Finally Dying. Here's Mine
If you want to sample the early version of a post-password future, all you have to do is switch on a common security feature of every major Web service.
Digital rights management
Digital rights management (DRM) is a class of technologies that are used by hardware and software manufacturers, publishers, copyright holders, and individuals with the intent to control the use of di...
Federated identity
A federated identity in information technology is the means of linking a person's electronic identity and attributes, stored across multiple distinct identity management systems.Related to federated i...
Identity management
In computing, identity management (IdM) describes the management of individual principals, their authentication, authorization, and privileges within or across system and enterprise boundaries with th...
Smart card
A smart card, chip card, or integrated circuit card (ICC) is any pocket-sized card with embedded integrated circuits. Smart cards are made of plastic, generally polyvinyl chloride, but sometimes polye...
Smart card - Wikipedia
Mobilegov
Mobilegov is an IT security software editor. The company was founded in 2004.Mobilegov’s aim is to provide costumers with solutions that protect their data and recognise their users through a network ...
Beware of ads that use inaudible sound to link your phone, TV, tablet, and PC
Privacy advocates are warning federal authorities of a new threat that uses inaudible, high-frequency sounds to surreptitiously track a person's online behavior across a range of devices, including ph...
Google Says Too Many People Use 'Pizza' To Answer Security Questions
In fact, stop using security questions at all. We all love pizza, but that doesn’t mean you should be using it as a way to keep your data safe online. In a new research paper, Google staffers found t...
The Password Is Finally Dying. Here's Mine
If you want to sample the early version of a post-password future, all you have to do is switch on a common security feature of every major Web service.
Computational trust
In information security, computational trust is the generation of trusted authorities or user trust through cryptography. In centralised systems, security is typically based on the authenticated ident...
HTTP cookie
A HTTP cookie (also called web cookie, Internet cookie, browser cookie or simply cookie, the latter which is not to be confused with the literal definition), is a small piece of data sent from a websi...
Multi-factor authentication
Multi-factor authentication (MFA) is a method of computer access control which a user can pass by successfully presenting authentication factors from at least two of the three categories:Requiring mor...
Multi-factor authentication - Wikipedia
Sun Java System Access Manager
Sun Java System Access Manager is Sun Microsystems' web access management product and a component of Sun Java Enterprise System. Sun Java System Access Manager provides single sign-on, federation and ...
Sun Java System Access Manager - Wikipedia
Initiative For Open Authentication
Initiative for Open Authentication (OATH) is an industry-wide collaboration to develop an open reference architecture using open standards to promote the adoption of strong authentication. It has clos...
Spring Security
Spring Security is a Java/Java EE framework that provides authentication, authorization and other security features for enterprise applications. The project was started in late 2003 as 'Acegi Security...
Spring Security - Wikipedia
Stuxnet
Stuxnet is a computer worm that was discovered in June 2010. It was designed to attack industrial programmable logic controllers (PLCs).PLCs allow the automation of electromechanical processes such as...
Stuxnet - Wikipedia
Closed-loop authentication
Closed-loop authentication, as applied to computer network communication, refers to a mechanism whereby one party verifies the purported identity of another party by requiring them to supply a copy of...
Security Assertion Markup Language
Security Assertion Markup Language (SAML, pronounced sam-el) is an XML-based, open-standard data format for exchanging authentication and authorization data between parties, in particular, between an ...
Security Assertion Markup Language - Wikipedia
Role hierarchy
In role based access control, the role hierarchy defines an inheritance relationship among roles. For example, the role structure for a bank may treat all employees as members of the ‘employee’ role....
Richacls
Richacls is a Linux implementation of the NFSv4 ACLs which has been extended by file masks to more easily fit the standard POSIX file permission model.Nowadays, they offer the most complex permission ...
Authorization
Authorization or authorisation is the function of specifying access rights to resources related to information security and computer security in general and to access control in particular. More forma...
LOMAC
Low Water-Mark Mandatory Access Control (LOMAC) is a Mandatory Access Control model which protects the integrity of system objects and subjects by means of an information flow policy coupled with the ...