Skip to main content
Graph
Search
fr
|
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Access Control Policies: Authentication and Authorization
Graph Chatbot
Related lectures (32)
Previous
Page 3 of 4
Next
Discretionary Access Control II
Explores alternative access control implementations and the confused deputy problem in access control systems.
Post-Quantum Cryptography: Formalism and Access Control
Covers the formalism of post-quantum cryptography and access control mechanisms.
Cloud RPCs: Communication and Architecture
Provides an overview of cloud remote procedure calls and their role in software architecture, covering key concepts, protocols, and practical applications.
Identity Theft: Mat Honan's Journey to Hell
Explores Mat Honan's identity theft journey, emphasizing security strategies and data backup.
Password Security
Emphasizes the importance of creating secure passwords and safeguarding credentials.
Biometric Research: Finger Vein Recognition Techniques
Covers advancements in finger vein recognition technology and its applications in biometric identity verification.
Conditional Access II
Covers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Security Design Principles: Preliminaries
Covers basic security concepts, adversarial thinking, security mechanisms, and responsible conduct in security design principles.
Principles II: Complete Mediation, Open Design, Separation of Privilege
Discusses the 'complete mediation', 'open design', and 'separation of privilege' principles to enhance system security.
Distributed Storage Challenges
Explores challenges in distributed storage, covering organization, availability, scalability, and access control.