Authentication

Learn about authentication, we have the largest and most updated authentication information on alibabacloud.com

Elefant CMS 0.9.3-beta release MVC framework System

Elefant is a redesigned MVC framework system in PHP, including a completely new CMS. Its main functions include:-simple URL routing with URLs-secure database extraction and modeling system-default output filter compiled template-Integrated caching system-Flexible input validation (server-side and browser)-Simple table handling -17813.html "> Customizable user authentication-internationalization/localization-CLI support for background tasks-small scaffolding-Reusable application CMS tasks (...)

MOD_AUTH_PUBTKT 0.7 Publishing Web single sign-on tool

MOD_AUTH_PUBTKT is a simple Web single sign-on (SSO) solution for http://www.aliyun.com/zixun/aggregation/14417.html ">apache." It uses a public key cryptography algorithm (DSA or RSA) to support the client authentication ticket provided by the cookie, simply by logging on to the server to generate the private key required by the ticket, and the Web server can verify the public key given by the ticket. Mod_auth_pubt ...

Kronolith H4 (3.0.6) Publish the Tribal Calendar tool

Kronolith is a tribal calendar tool that provides a stable and full-featured unique calendar system. Enables the extensive use of tribal frameworks to provide integration with other applications. It implements a reliable, stand-alone calendar system that supports repetitive events, all-day events, custom fields, keywords, shared calendars, free/busy information, and manages multiple users through tribal authentication. Kronolith H4 (3.0.6) version supports synchronization, improved participant management, improved performance, and relaxed requirements for WebDAV servers ...

New features of Android rumors: Newer APIs, enterprise applications, data encryption

According to sources, as part of Google's next Android version, Google is working to develop specific features that will lead the way for BlackBerry, Apple and Samsung, and Google's main effort is to add features to make Android attractive to commercial and corporate buyers. Android President Sundar Pichai is currently actively promoting the security of the Android system, possibly including storing sensitive information directly on the chip, powerful data encryption, and requiring additional authentication (like ...).

Research on security Trust and guarantee registration project of Cloud Security alliance

Cloud Security Alliance Security Trust and Assurance Registration Project Research Ye Runguo Fanco Xuchu Cai Lei in order to address the credible lack of public cloud services, the Cloud Security alliance launched a security Trust and assurance registration project. This paper studies the background of the project and the Open authentication framework aimed at transparency, as well as the typical certification process including self-assessment and third party evaluation, and introduces the progress of current registration and certification of the project, as well as the follow-up research plan of continuous monitoring and certification. Finally, the paper gives some suggestions on the research and development of the evaluation and certification standards of cloud computing security in China. Cloud Security Alliance Security ...

Talking about the challenges and opportunities of cloud security from authentication

Many IT staff believe that public cloud services are too insecure to secure critical program workloads and data.   But the medical information provider Schumacher Group chief information officer Doug Menefee doesn't think so. "There is a real risk of using cloud services, but everything is risky and we have to weigh the business interests against these risks."   "Menefee does, and now 85% of the Schumache group's business data is within the public cloud service. Menefee not think of himself as a cloud ...

Community cloud Security, the realization of worry-free construction station Service Commitment

With the increasing complexity of the Internet environment, the information security is threatened, and the anti-virus software will not be able to deal with the increasing malicious programs effectively in the future. Cloud security application, not only can identify and killing local hard disk virus library, but rely on a large network services, real-time collection, analysis and processing network security problems.     The Alibaba community Cloud offers two cloud security solutions: Cloud Shield and cloud authentication code. Yun Dun is the Aliyun Internet Content Security Defense product, provides the entire network application based on cloud computing technology the Content security Defense solution ...

Shenzhou Digital 802.1x EAPOL Protocol, DCBA-BAS Certification scheme

Test platform: http://www.aliyun.com/zixun/aggregation/13835.html ">ubuntu 8.04, 8.10, 9.04 Shenzhou Digital certification There are two main types: 802.1x EAPOL protocol, Authentication based on link layer, Dcba-bas, authentication protocol based on application layer. Common use of one or both of these. 802.1X of the certification authorities do not provide the win platform software, but ...

Network black production tends to attack mobile phones, nearly 200 million users nationwide infected with the virus

20th, Tencent released "Thunder Action Network Black industry chain annual Report" shows that the network black production tends to attack mobile phones. 2014 nearly 200 million mobile phone users infected with the virus, daily average of 540,000 mobile phone poisoning. The report points out that because of the PC end in the anti-virus and security net shopping, online payment security software and verification methods relative to the mobile end more powerful, network black production personnel are more inclined to attack the opponent, through the implantation of mobile phone trojans and other ways to obtain user personal information, and then control the mobile phone, intercept SMS authentication code, the implementation of network theft. According to the report, there were 197 million mobile terminals in 2014.

Security research and model design of IoT based on RFID

Research and model design of IoT security based on RFID the Yi of Shandong University, through the research on the development history of the Internet of things, and the analysis and overview of the research on the field of Internet security by domestic and foreign researchers, put forward the research subject of the security of RFID tag. Firstly, some key technologies of IoT, such as RFID tag technology, EPC Coding and network, are analyzed, and the security problems are studied. Then, according to the characteristics of RFID system, a set of two-way authentication protocol based on the derived key and hash function is proposed, the content and form of the protocol.

Global Top 20 Cloud security Vendors

Security is a critical issue, both for private and public cloud deployments.   Typically, cloud security refers to user authentication and data protection, which are implemented through data encryption. Among them, many of the issues that threaten cloud security are found in employee access to cloud services and related data management validation.   In addition, how to extend the policies and standards of internal networks to the cloud is also a challenge for many corporate institutions in the "cloud age". Now, let's take a look at the selection by crn ...

Oracle warns of serious vulnerabilities in HTTP server products

On September 21, according to foreign media reports, Oracle has advised administrators to update the system because of a significant security breach found in the company's HTTP server products based on Apache 2.0 or 2.2. The vulnerability component, which exists in the Fusion middleware 11g and creator Server 10g platform, triggers a denial-of-service attack. This vulnerability can be exploited remotely, without the need for a local login or a user name password and other legal authentication. More complete details can be secured in Oracle ...

Sohu Video Mobile Client is the first video client to integrate China Mobile WiFi login feature

Absrtact: November 22, Sohu Video announced and reached a deep strategic cooperation with China Mobile, becoming the first online video site for ipad users to launch China Mobile WiFi certified video client. This is also Sohu video Mobile client following the lead in support of Apple November 22, Sohu Video announced with China Mobile to reach a deep strategic cooperation, become the first online video field for ipad users launched China Mobile WiFi authentication video client site. This is also Sohu video Mobile client following the lead in supporting Apple's newest iOS5 and Google ...

SSH protocol combined with Java code to achieve client login authentication

Before we begin, let's have a broad overview of the SSH protocol, which is more conducive to our understanding of this article. The first thing to mention is http://www.aliyun.com/zixun/aggregation/11991.html "> Computer network protocol, the so-called Computer network protocol, simply defined a set of standards and rules, So that the normal network communication between different computers, does not appear on one machine issued instructions to another machine is not recognized ...

Aletheia 0.0.8 Publish HTTP send requestor

Aletheia is a browser-like application that sends the original HTTP request, which is written in Java and is used primarily for debugging and locating security issues in Web applications. It can apply filters in each request and response to modify content such as Basic authentication or http://www.aliyun.com/zixun/aggregation/13376.html ">oauth requests." You can set up custom cookies or user proxies through it, or send ...

Amun 0.3.1 release socialized content management system

Amun 0.3.1 This version fixes a serious error that causes Amun to not recognize Http://www.aliyun.com/zixun/aggregation/13376.html ">oauth header requests in the API, Therefore, authentication is not possible. It updates htmlpurifier to version 4.3.0. Fix gadget systems and update several API terminals. Implemented a new default design and improved event and approval system. Amun is a ...

ASP. Some suggestions on web standards in net development

Visual Studio.NET from 2003 to now 2008, along the way to slowly strong ...   From the previous vs2003 can automatically change your HTML code to now in the vs2008 can directly to the HTML code for the standard authentication and hint, very difficult. Forums are also often engaged. NET development of the novice friend asked some ASP.net development process and web standards conflict between the problem, in fact, is the client code generation problem. More advanced development level of things I also ...

Authenticated key agreement protocol based on hierarchical identity for provable security

Authenticated key agreement protocol based on hierarchical identity Cao Chenlei Liu Mingxi Zhang Ju Yang Yixian The current Identity-based Authentication Key agreement protocol is a trusted third party with a single private key generator (PKG), but it is difficult to meet the requirement of identity layering registration and authentication. This paper reconstructs the constituent elements of the private key based on the hierarchical Identity Encryption (Hibe) system. A authenticated key agreement protocol based on hierarchical identity is proposed by using bilinear mapping on elliptic curve multiplication cyclic group, which provides a secure session key bargaining machine for cloud entities belonging to different levels.

Five main points of best practice in hybrid cloud Model Management

For enterprises with a hybrid cloud model for authentication, the implementation must be planned so that it can be managed as accurately as the existing private cloud. Below, we give a way to manage a mixed cloud, assuming it teams follow the corporate ITIL best practices. No matter how carefully you choose public cloud services and how well you match your private cloud design, differences are inevitable. The greater the difference between two clouds, the more difficult it is to manage the two clouds as a single entity. You will also get the biggest gains from your existing hybrid cloud management strategy and best practices as much as possible. ...

Users in the air to write and paint can achieve identity authentication

Absrtact: Imagine, flick a mobile phone, mobile phone unlocked; waved a wave, the door opened, light, is not very much like the world of Harry Potter? Recently contacted a Taiwan Entrepreneurship project, called Airsig, in the Muggle world to achieve this black magic, let the user imagine, waved a mobile phone, mobile phone unlocked; waved a wave, the door opened, light, is not very much like the world of Harry Potter? Recently contacted a Taiwan Entrepreneurship project, called Airsig, in the Muggle world to achieve this "black magic", so that users in the air to write and paint can achieve body ...

Total Pages: 19 1 .... 5 6 7 8 9 .... 19 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.