Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Authorization
Applied sciences
Computer engineering
Computer security
Access control
Graph Chatbot
Related lectures (10)
Login to filter by course
Login to filter by course
Reset
Anonymous Authorization: Privacy Engineering Toolbox
Covers anonymous authorization, zero-knowledge proofs, attribute-based credentials, and practical issues in anonymous authentication.
Service Desk Portal
Explores the EPFL Service Desk portal, offering support for requests, incident reporting, health services, and more.
Access control: introduction
Covers the concept of access control in computer security, its importance, implementation, and policy decision approaches.
Discretionary Access Control I
Covers the implementation of Discretionary Access Control using Access Control Matrix and Lists.
Network Security: Desired Properties and Solutions
Discusses the importance of network security properties and solutions to enhance overall security.
Network Security: ARP Spoofing
Delves into routing in LAN, ARP spoofing attacks, and defense strategies against them, emphasizing the risks of network vulnerabilities.
Security Testing and Spoofing
Covers security testing techniques, spoofing vulnerabilities, encryption bans, and network security properties.
Symmetry Operations in Quantum Mechanics
Explores symmetry operations in quantum mechanics, emphasizing the preservation of state properties.
Access Control Policies: Authentication and Authorization
Explores access control policies, authentication methods, and the principles of least privilege, emphasizing the importance of secure and user-friendly authentication protocols.
Discretionary Access Control II
Explores alternative access control implementations and the confused deputy problem in access control systems.
Previous
Page 1 of 1
Next