Authentication Security Computers


Software integrates into existing networked applications. Secure telnet and FTP available. Open source. User and technical documentation as well as source code.








    Top: Computers: Security: Authentication


See Also:
  • M-Tech Information Technology, Inc. - ID-Synch, identity management software for managing user administration computers processes. Product information, customers, press releases and contact computers details.
  • The Open Group: Identity Management Forum - Consortium promoting open standards-based identity management. Includes downloadable authentication white papers authentication and information on current projects.
  • IIS User Authentication Tutorial - Information on various methods for WWW password protection computers using Internet Information Server (IIS). Text-based tutorial with computers some screenshots.
  • Theory of Identification and Authentication - History and development of mechanisms and techniques.
  • Dos and Don'ts of Client Authentication on the Web - Paper by Kevin Fu, Emil Sit, Kendra Smith, security and Nick Feamster. In the Proceedings of the security 10th USENIX Security Symposium, Washington, D.C., August 2001.[PDF]
  • Open Systems Management - Password synchronization and role based access control across security UNIX, Windows authentication NT and resident applications. Site contains security FAQs.
  • Remote User Authentication in Libraries - A collection of resources for libraries and universities. authentication Includes links computers to software and some links of authentication interest to non-librarians.
  • Unisys - Makers of several related products. Includes rationale as well as usage information.
  • Intertrust Technologies Corporation - Develops general purpose digital rights management platform which serves as foundation for providers of digital information, technology and commerce services to participate in a global system for digital commerce. (Nasdaq: ITRU).
  • Secure Remote Passwords - Software integrates into existing networked applications. Secure telnet computers and FTP available. Open source. User and technical computers documentation as well as source code.
  • Finally Software - Enterprise security solutions based on PKI and Kerberos. computers Also offer authentication a secure terminal emulator for connecting computers to Unix servers from authentication Windows. Product information and computers downloadable evaluation software.
  • Pluggable Authentication Modules - Sun\'s official PAM documentation. Programmer documentation and source computers code.
  • iisPROTECT - Functions with Internet Information Server to secure web sites. Includes authentication live demo.
  • BioPassword - A software-based technology that learns and verifies unique typing patterns. authentication Includes an introduction to biometrics and keyboard dynamics.
  • RSA Security - Products include token-based one time password systems and single sign security on systems. Site contains information on security.
  • Password Management - Paper by M. Bishop, 1991. Discusses problems of security password selection security and password management, and identifies relevant security techniques.[PDF]
  • NMA, Inc. - ZSentry two-factor authentication solution. Product information, white papers authentication and contact computers details.
  • SAFLINK - Offer a range of identity management solutions based computers on tokens, authentication smartcards and biometrics. Headquarters in Bellevue, computers WA.
  • A Proactive Password Checker - Paper by M. Bishop, 1991. The author describes security a technique, and a mechanism, to allow users security to select passwords which to them are easy security to remember but to others would be very security difficult to guess. [Postscript]
  • I/O Software - Provider of software solutions, including biometric solutions. Product computers descriptions and technology licensing terms.
  • SecureUser.net - Providers of tools to e-commerce developers. Technology explanation and case studies.
  • Vasco - Makers of both software and hardware systems. Demos, authentication case studies authentication and product information.


   MySQL - Cache Direct


  
Twitter