Category:Computer access control
![]() | Computing portal |
Here is a list of articles in the Computer access control category of the Computing portal that unifies foundations of mathematics and computations using computers.
Subcategories
This category has the following 6 subcategories, out of 6 total.
C
F
I
P
S
Pages in category "Computer access control"
The following 127 pages are in this category, out of 127 total.
- Computer access control (computing)
A
- Access control expression (computing)
- Access control list (computing)
- Access-control list (computing)
- Access Control Matrix (computing)
- Account verification (computing)
- Atomic authorization (physics)
- Attribute-based access control (computing)
- Template:Authentication
- Authentication (computing)
- Authorization (computing)
B
- Bell–LaPadula model (computing)
- Bitium (company)
C
- CCID (protocol) (computing)
- Challenge–response authentication (computing)
- Closed-loop authentication (computing)
- Comparison of privilege authorization features (computing)
- Computational trust (computing)
- Context-based access control (computing)
- Copy protection (computing)
- Credential lag (computing)
- Cryptographic log on (computing)
D
- DACL (computing)
- Database audit (computing)
- Decentralized identifiers (computing)
- Delegated administration (computing)
- Delegation (computer security) (computing)
- Digital identity (computing)
- Self-sovereign identity (computing)
- Directory service (computing)
- Discretionary access control (computing)
- Distributed Access Control System (software)
- Draw a Secret (computing)
E
- ESIM (computing)
F
- Federated identity (computing)
- FinFisher (computing)
- Form-based authentication (computing)
- FreeOTP (software)
G
- GateKeeper (access control device) (software)
- Gigya (company)
- Google Authenticator (software)
- GOV.UK Verify (computing)
- Goverlan Systems Management (software)
- Graph-based access control (computing)
H
- Hacking Team (company)
- HERAS-AF (software)
- HTTP cookie (computing)
- HTTP+HTML form-based authentication (computing)
I
- IBM Lightweight Third-Party Authentication (computing)
- IBM Tivoli Access Manager (computing)
- ID-WSF (computing)
- Identity driven networking (computing)
- Identity provider (computing)
- Identity-based security (computing)
- Initiative for Open Authentication (computing)
- Integrated Windows Authentication (computing)
- Internet Authentication Service (computing)
J
- Java Authentication and Authorization Service (computing)
- JSON Web Signature (computing)
- JSON Web Token (computing)
L
- LinOTP (software)
- Location-based authentication (computing)
- Logical access control (computing)
- Login (computing)
- Login manager (computing)
- LOMAC (computing)
M
- Macaroons (computer science) (computing)
- Mandatory access control (computing)
- MicroID (computing)
- Microsoft Fingerprint Reader (computing)
- Mobilegov (company)
- Multi-factor authentication (computing)
- MultiOTP (software)
- Mutual authentication (computing)
N
- NemID (computing)
- NIST RBAC model (computing)
- Nitrokey (computing)
- Numina Application Framework (software)
O
- OAuth (computing)
- Object-capability model (computing)
- One-time authorization code (computing)
- One-time password (computing)
- OneLogin (company)
- Organisation-based access control (computing)
P
- PassWindow (computing)
- Everykey (company)
- Passwordless authentication (computing)
- Pre-boot authentication (computing)
- PrivacyIDEA (software)
R
- Regin (malware) (computing)
- Registered user (computing)
- Remote Utilities (software)
- Richacls (computing)
- Risk-based authentication (computing)
- Role hierarchy (computing)
- Rublon (software)
S
- SAML 2.0 (computing)
- SAML-based products and services (computing)
- Secure attention key (computing)
- Security Assertion Markup Language (computing)
- Security question (computing)
- Security token (computing)
- Service provider (SAML) (computing)
- Shamoon (computing)
- Sign-on server (computing)
- SIM card (computing)
- Single sign-on (computing)
- SiteKey (computing)
- Social login (computing)
- Software token (computing)
- Spring Security (software)
- Strong authentication (computing)
- Stuxnet (engineering)
- Subscriber identity module (computing)
T
- Thin SIM (computing)
- Time-based One-time Password algorithm (computing)
- Transaction authentication number (computing)
- TUPAS (computing)
U
- Universal controls (computing)
- Usability of web authentication systems (computing)
- User-Managed Access (computing)
W
- Wilmagate (computing)
- WS-Federation (computing)
- WS-Trust (computing)
Y
- YubiKey (company)