To - Google Patents
Smart Strategies for Securing Extranet AccessTo
View PDF- Document ID
- 11115816354837699125
- Author
- To W
External Links
Snippet
In today's competitive business landscape, organizations are compelled to share data, files, and applications with external partners, customers, and remote workers. Primarily, they are doing this over extranets. In one report, Cathay Pacific Airways implemented an extranet to …
- 230000002860 competitive 0 abstract description 3
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Uddin et al. | A dynamic access control model using authorising workflow and task-role-based access control | |
AU2019206006B2 (en) | System and method for biometric protocol standards | |
JP6625636B2 (en) | Identity infrastructure as a service | |
US8332922B2 (en) | Transferable restricted security tokens | |
US11605093B1 (en) | Security policy enforcement | |
Cusack et al. | Evaluating single sign-on security failure in cloud services | |
Gordon et al. | The Official (ISC) 2 guide to the SSCP CBK | |
Hettiarachchige et al. | Holistic authentication framework for virtual agents; UK banking industry | |
Sasada et al. | Web-biometrics for user authenticity verification in zero trust access control | |
Neil | CompTIA Security+ Certification Guide: Master IT security essentials and exam topics for CompTIA Security+ SY0-501 certification | |
Salini et al. | A model based security requirements engineering framework applied for online trading system | |
Ramirez | A framework to build secure microservice architecture | |
Narang et al. | Severity measure of issues creating vulnerabilities in websites using two way assessment technique | |
To | Smart Strategies for Securing Extranet Access | |
Roy | A Review on Zero Trust-Balancing Security and Usability Needs | |
Rao et al. | Access controls | |
Alipour et al. | A policy based access control model for web services | |
Sizov | Securing Organizational Assets: A Comprehensive Analysis of Privileged Access Management | |
Saini | Comparative analysis of top 5, 2-factor authentication solutions | |
Shanmugam | Improving Customer Experience and Reducing Customer Churn by Implementing Frictionless, Adaptive, and Risk-Based Authentication Controls for Digital Assets | |
Reza et al. | Security trade-off analysis of service-oriented software architecture | |
Ouko | Identity management and user authentication approach for the implementation of bring your own device in organizations | |
Haber et al. | Understanding Enterprise Identity | |
Terziyska et al. | Opportunities to Achieve Cyber Security Through Blockchain and Smart Contracts | |
Anand | Role of IAM in an Organization |