×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [policy configuration]
Dynamic VPN Appnote v12
32 views
Getting Started with the StrongLoop Node.js API Gateway
25 views
L. Alchaal & al. Page 1 2002 Offering a Multicast Delivery Service in a Programmable Secure IP VPN Environment Lina ALCHAAL Netcelo S.A., Echirolles INRIA
212 views
IIIT Security Workshop1 Chapter Authentication Applications ADAPTED FROM THE PRESENTATION by Henric Johnson Blekinge Institute of Technology,Sweden
218 views
Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009
214 views
Can Economic Incentives Make the ‘Net Work? Jennifer Rexford Princeton University jrex
214 views
Protect your data Enable your users Unify Your Environment DevicesAppsData Help organizations enable their users to be productive on the devices they
223 views
Dominik Zemp TSP Security Microsoft Switzerland
[email protected]
234 views
Enterprise PI - How do I manage all of this? Robert Raesemann J Jacksonville, FL
216 views
EE515/IS523 Think Like an Adversary Lecture 7 Usability/Software Failures Yongdae Kim
216 views
A User-to-User Relationship-based Access Control Model for Online Social Networks Yuan Cheng, Jaehong Park and Ravi Sandhu Institute for Cyber Security
214 views
Position Statement Debbie Perouli, PhD Student Sonia Fahmy, Associate Professor Computer Science Department Purdue University WODNAFO 10
214 views
< Prev
Next >