×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [access decision]
Home >
access decision
Wave 5 - The Socialisation of Brands
61.427 views
Access control for geospatial information objects using/extending the eXtensible Access Control Markup Language Andreas Matheus, Technische Universität.
225 views
Appropriate Access InCommon Identity Assurance Profiles David L. Wasley Campus Architecture and Middleware Planning workshop February 2008.
214 views
NIST PKI workshop Mary Thompson Srilekha Mudumbai Abdelilah Essiari Willie Chin Lawrence Berkeley National Laboratory Authorization Policy in a PKI Environment.
214 views
BT BYOD Solutions
14.092 views
WCC 2014: Globalization and cloud services for the enterprise
110 views
Karen Cheney SMART Big Society
321 views
Java Distributed Computing Technology Ernie Cohen Telcordia Technologies.
215 views
Http://iamsect.ncl.ac. uk Shibboleth More commonly associated with secure authentication and authorisation systems. (also, believed to be the first password)
216 views
Multilinear Maps From Ideal Lattices and Applications
40 views
ConFoo 2015 - Securing RESTful resources with OAuth2
431 views
UMA’s relationship to distributed authorization concepts 19 October 2013 tinyurl.com/umawg @UMAWG.
213 views
Next >