Search
Selected: R

Role-based authorization of network services using...

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Role-based portal to a workplace system

Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Router for managing trust relationships

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Router for use in a monitored network

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

RPC port mapper integrity checker to improve security of a...

Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Rule based security policy enforcement

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Rule-driven specification of web service policy

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Runtime modification of client user controls

Information security – Prevention of unauthorized use of data including prevention...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.