Computer access control
In computer security, general access control includes authorization, authentication, access approval, and audit. A more narrow definition of access control would cover only access approval, whereby th...
Beware of ads that use inaudible sound to link your phone, TV, tablet, and PC
Privacy advocates are warning federal authorities of a new threat that uses inaudible, high-frequency sounds to surreptitiously track a person's online behavior across a range of devices, including ph...
Google Says Too Many People Use 'Pizza' To Answer Security Questions
In fact, stop using security questions at all. We all love pizza, but that doesn’t mean you should be using it as a way to keep your data safe online. In a new research paper, Google staffers found t...
The Password Is Finally Dying. Here's Mine
If you want to sample the early version of a post-password future, all you have to do is switch on a common security feature of every major Web service.
Digital rights management
Digital rights management (DRM) is a class of technologies that are used by hardware and software manufacturers, publishers, copyright holders, and individuals with the intent to control the use of di...
Federated identity
A federated identity in information technology is the means of linking a person's electronic identity and attributes, stored across multiple distinct identity management systems.Related to federated i...
Identity management
In computing, identity management (IdM) describes the management of individual principals, their authentication, authorization, and privileges within or across system and enterprise boundaries with th...
Smart card
A smart card, chip card, or integrated circuit card (ICC) is any pocket-sized card with embedded integrated circuits. Smart cards are made of plastic, generally polyvinyl chloride, but sometimes polye...
Smart card - Wikipedia
One-time authorization code

In a broad sense, one time authorization code (OTAC) means a code that valid for only one session to authenticate a user`s identity. It is not only used in mechanisms to identify a user’s identit...
One-time authorization code - Wikipedia
Digipass
Digipass is a brand name for a security token and other authentication products and services from Vasco Data Security International. This product family provides strong user authentication and digital...
Digipass - Wikipedia
Beware of ads that use inaudible sound to link your phone, TV, tablet, and PC
Privacy advocates are warning federal authorities of a new threat that uses inaudible, high-frequency sounds to surreptitiously track a person's online behavior across a range of devices, including ph...
Google Says Too Many People Use 'Pizza' To Answer Security Questions
In fact, stop using security questions at all. We all love pizza, but that doesn’t mean you should be using it as a way to keep your data safe online. In a new research paper, Google staffers found t...
The Password Is Finally Dying. Here's Mine
If you want to sample the early version of a post-password future, all you have to do is switch on a common security feature of every major Web service.
Delegated administration
Delegated administration describes the decentralization of role-based-access-control systems. Many enterprises use a centralized model of access control. For large organizations, this model scales p...
HTTP cookie
A HTTP cookie (also called web cookie, Internet cookie, browser cookie or simply cookie, the latter which is not to be confused with the literal definition), is a small piece of data sent from a websi...
Multi-factor authentication
Multi-factor authentication (MFA) is a method of computer access control which a user can pass by successfully presenting authentication factors from at least two of the three categories:Requiring mor...
Multi-factor authentication - Wikipedia
Initiative For Open Authentication
Initiative for Open Authentication (OATH) is an industry-wide collaboration to develop an open reference architecture using open standards to promote the adoption of strong authentication. It has clos...
Microsoft account
Microsoft account (previously Microsoft Passport, .NET Passport, Microsoft Passport Network, and Windows Live ID) is a single sign-on web service developed and provided by Microsoft that allows users ...
Microsoft account - Wikipedia
OneLogin
OneLogin, Inc. is the developer of the service OneLogin, which provides single sign-on and identity management for cloud-based applications. OneLogin focuses primarily on companies that operate in the...
VOMS
VOMS is an acronym used for Virtual Organization Membership Service in grid computing. It is structured as a simple account database with fixed formats for the information exchange and features single...
Spring Security
Spring Security is a Java/Java EE framework that provides authentication, authorization and other security features for enterprise applications. The project was started in late 2003 as 'Acegi Security...
Spring Security - Wikipedia
Closed-loop authentication
Closed-loop authentication, as applied to computer network communication, refers to a mechanism whereby one party verifies the purported identity of another party by requiring them to supply a copy of...
Security Assertion Markup Language
Security Assertion Markup Language (SAML, pronounced sam-el) is an XML-based, open-standard data format for exchanging authentication and authorization data between parties, in particular, between an ...
Security Assertion Markup Language - Wikipedia
Role hierarchy
In role based access control, the role hierarchy defines an inheritance relationship among roles. For example, the role structure for a bank may treat all employees as members of the ‘employee’ role....
Selectable Output Control
Selectable Output Control (SOC) is a content protection Digital Rights Management (DRM) technology that is incorporated into approved devices that enables the Multichannel Video Programming Distributo...
Authorization
Authorization or authorisation is the function of specifying access rights to resources related to information security and computer security in general and to access control in particular. More forma...