Attribute level access control
Auditing authorization decisions
Auditing compliance with a hippocratic database
Auditing secret key cryptographic operations
Authentic device admission scheme for a secure communication...
Authenticated distributed detection and inference
Authenticated domain name resolution
Authenticated firewall tunneling framework
Authenticating a client using linked authentication credentials
Authenticating a user of a wireless data processing device
Authenticating computed results in a public distributed...
Authenticating multiple network elements that access a...
Authenticating products
Authenticating resource requests in a computer system
Authentication agent apparatus, authentication method, and...
Authentication and authorization across autonomous network...
Authentication and authorization across autonomous network...
Authentication and authorization mapping for a computer network
Authentication and authorization mapping for a computer network
Authentication and security in wireless communication system