×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [authorization logic]
Home >
authorization logic
Using Graph Databases in Real-Time to Solve Resource Authorization at Telenor - GraphConnect San Francisco 2013
1.671 views
Using Graph Databases in Real-Time to Solve Resource Authorization at Telenor - Sebastian Verheughe @ GraphConnect London 2013
740 views
Using Graph Databases in Real-time to Solve Resource Authorization at Telenor - Sebastian Verheughe @ GraphConnect SF 2013
740 views
Identity as a Service
8.518 views
Cloud Identity Webinar
3.106 views
Using Graph Databases in Real-Time to Solve Resource Authorization at Telenor - GraphConnect London 2013
1.170 views
Comparison of different access controls
294 views
Attack Surface Reduction for Web Services based on Authorization Patterns
136 views
SMARTIE
30 views
C HAPTER 12 W EB APP SECURITY. T HE BAD GUYS ARE EVERYWHERE As a web application developer you need to protect your web site There are three main kind.
212 views
Programming Trustworthy Provenance
35 views