TITLE

Giving Workers a Digital Identity

PUB. DATE
November 2005
SOURCE
Bank Technology News;Nov2005, Vol. 18 Issue 11, p51
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Reports on the importance of combining electronic employee identification and access to reduce time and costs of banking transactions in the U.S. Pursuance of providing security measures to protect customer information; Application of automation of provisioning, a process aids companies to save labor hours monthly; Employment of Accountcourier, a user-provisioning platform that lets authorized users instantly grant, revoke or modify access to any operating system, application of information technology asset.
ACCESSION #
18953924

 

Related Articles

  • Improved dynamic ID-based remote user authentication scheme. WANG Ying; PENG Xin-guang; BIAN Jing // Application Research of Computers / Jisuanji Yingyong Yanjiu;Dec2014, Vol. 31 Issue 12, p3738 

    Dynamic ID-based remote user authentication scheme is designed to prevent leakage of users' key information while enabling authenticated users to be granted access to net-work services. This paper firstly analyzed some security flaws in Wen-Li's dynamic ID-based remote user authentication scheme...

  • How to Create and Protect Your Passwords.  // Illinois Banker;Nov/Dec2013, Vol. 98 Issue 6, p10 

    The article focuses on creating and protecting passwords in the banking industry. Password crackers work best for short passwords or those that use common names, places and dictionary words. List of common passwords are readily available to improve efficiencies for these programs. Strong...

  • The Implementation of Remote Automation Execution Agent over ACL on QOS POLICY Based System. Amir, Hazly; Puniran, Roime // Proceedings of World Academy of Science: Engineering & Technolog;May2008, Vol. 41, p319 

    This paper will present the implementation of QoS policy based system by utilizing rules on Access Control List (ACL) over Layer 3 (L3) switch. Also presented is the architecture on that implementation; the tools being used and the result were gathered. The system architecture has an ability to...

  • Automating Compliance. MACKEY, RICHARD E. // Information Security;May2009, Vol. 11 Issue 5, p17 

    The article discusses the value of identity and vulnerability management technologies in regulatory compliance. It enumerates the common regulatory requirements and provides foundational rules in fulfilling regulatory directives. It examines the mechanisms for identity management that are...

  • Security by subscription. Hines, Matt // NetworkWorld Asia;Apr2008, Vol. 4 Issue 3, p30 

    The article discusses the significance of software as a service (SaaS) to information technology as malware threats and regulatory demands continue to grow more complex. According to top industry executives, IT will become increasingly dependent on SaaS offerings that let them respond to...

  • INTERNET FILTERING IN SCHOOL ENVIRONMENTS. Goodman, Jane // Media & Methods;Mar2003, Vol. 39 Issue 5, p14 

    Focuses on the importance of Internet filtering solutions to schools. Requirements of the Internet safety legislation passed by the U.S. Congress in December 2002; Benefits of Internet filtering programs to schools; Criteria to consider when shopping for the right filtering solution.

  • A Purpose Based Usage Access Control Model. Lili Sun; Hua Wang // International Journal of Computer & Information Engineering;Jan2010, Vol. 4 Issue 1, p44 

    As privacy becomes a major concern for consumers and enterprises, many research have been focused on the privacy protecting technology in recent years. In this paper, we present a comprehensive approach for usage access control based on the notion purpose. In our model, purpose information...

  • Keeping track of all your user IDs and passwords. LeClair, Lee // Inside Tucson Business;2/16/2009, Vol. 18 Issue 38, p15 

    The article reports on how to keep track of several user identifications and passwords in Arizona. It states that one way of keeping track of accounts and passwords is to use a password management utility. The author suggests to use a utility if is convenient and helps the user but be careful...

  • Security Perception ot a Portable PC User (The Difference Between Medical Doctors and Engineers): A Pilot Study. Šolic, Krešimir; Ilakovac, Vesna // Medicinski Glasnik;Aug2009, Vol. 6 Issue 2, p261 

    Aim The aim of this pilot study was to compare knowledge on security threats and habits in dealing with computer security issues. Methods Two groups of researchers and teaching staff, portable personal computer (PC) users, coming from different environments were included in the study: School of...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics