<--- Back to Details
First PageDocument Content
Access control / Identity management / Web services / Enterprise application integration / Service-oriented architecture / Public key infrastructure / Authentication / Business-to-business / XKMS / Cryptography / Computing / Security
Date: 2000-11-30 21:53:00
Access control
Identity management
Web services
Enterprise application integration
Service-oriented architecture
Public key infrastructure
Authentication
Business-to-business
XKMS
Cryptography
Computing
Security

White Paper ________________________ XML Trust Services

Add to Reading List

Source URL: xml.coverpages.org

Download Document from Source Website

File Size: 190,66 KB

Share Document on Facebook

Similar Documents

Ethernet / Security / Computing / Access control / Computer security / Identity management / Perimeter security / Physical security / USB / Door / Power over Ethernet / Network switch

NetAXS Web-based Access Control System Data Sheet

DocID: 1xVj6 - View Document

Computing / Software engineering / Computer programming / Programming languages / High-level programming languages / Concurrent programming languages / Java platform / Java / Call stack / Stack / Java Class Library / Go

Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation Philipp Holzinger∗ , Ben Hermann† , Johannes Lerch† , Eric Bodden‡ and Mira Mezini† ∗ Fraunhofer SIT, Email: philipp.holzinger@sit

DocID: 1xUqk - View Document

Computational complexity theory / Cryptography / Complexity classes / Theory of computation / NP / IP / Advice / PP / P / Soundness / Commitment scheme / Certificate

Monotone Batch NP-Delegation with Applications to Access Control Zvika Brakerski∗ Yael Tauman Kalai†

DocID: 1xUdf - View Document

Computability theory / Models of computation / Theoretical computer science / Software engineering / Scope / Lambda calculus / Computing

Extensible Access Control with Authorization Contracts Scott Moore Christos Dimoulas Robert Bruce Findler

DocID: 1xU35 - View Document

Theoretical computer science / Formal methods / Formal verification / Logic in computer science / Frappier / Electronic engineering

Validating SGAC Access Control Policies with Alloy and ProB Nghi Huynh, Marc Frappier, Amel Mammar and R´egine Laleau FA 2018, April 30th

DocID: 1xTC8 - View Document