×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [authorization model]
Home >
authorization model
Hadoop Security Architecture
4.255 views
Deployment guide series ibm tivoli ccmdb overview and deployment planning sg247565
1.277 views
Apache Hive authorization models
120 views
VGISCs view VGISC Uses Cases Geneva October 2005.
215 views
Fernando M Silva The role of authentication and eID interoperability in the access to scientific databases Fernando M. Silva Instituto Superior Técnico.
223 views
Advanced Controls access and user security for superusers con8824
1.027 views
Silicon Valley Code Camp 2009: OAuth: What, Why and How
1.504 views
SAP Audit Guidelines
1.129 views
A policy Management System for Business Collaboration Supervisor: Jian Yang Student ID: 40188949 Name: Young Bo Choi 1.
213 views
OpenSocial Europe 2010 Welcome!. Who am I? Developer Evangelist, Apps Market, Jive Software (mark dot weitzel at jivesoftware.com) President, OpenSocial.
214 views
An Access Control Model for Video Database Systems As a joint work of: Elisa Bertino 1, Ahmed K. Elmagarmid 2 and Moustafa M. Hammad 2 1 Dipartimento di.
212 views
Click to add text TWSd Configuring Tivoli Workload Scheduler Security 1of3 3202 Wednesday, May 2, 2012 TWS Education + Training April 29-May 3, 2012 Hyatt.
218 views
Next >