Assertion

Results: 1026



#Item
241Security / Federated identity / SAML 2.0 / Security Assertion Markup Language / Single sign-on / Computer security / System software / Identity management

Securing Mobile Data Wherever It Goes S O LU T I O N B R I E F SAML 2.0 Identity Provider Integration Brief Solution Overview

Add to Reading List

Source URL: bluebox.com

Language: English - Date: 2015-04-17 23:09:50
242Identity management / Security Assertion Markup Language / Voms / PERMIS / Grid computing / Capability-based security / Authorization / Privilege Management Infrastructure / Authentication / Security / Computer security / Access control

XPOLA – An Extensible Capability-based Authorization Infrastructure for Grids Liang Fang and Dennis Gannon Computer Science Department, Indiana University, Bloomington, INFrank Siebenlist

Add to Reading List

Source URL: www.extreme.indiana.edu

Language: English - Date: 2005-06-09 17:29:36
243Logic programming / Software engineering / Assertion / Debugging / Abstraction / SLD resolution / Abstract interpretation / Tree / Logic in computer science / Computer programming / Theoretical computer science

Automatic Binding-related Error Diagnosis in Logic Programs PaweÃl Pietrzak1 and Manuel V. Hermenegildo1,2 1 School of Computer Science, Technical University of Madrid (UPM)

Add to Reading List

Source URL: clip.dia.fi.upm.es

Language: English - Date: 2007-11-07 05:34:04
244HTTP / Basic access authentication / Application programming interface / Representational state transfer / XML / JavaScript / Hypertext Transfer Protocol / Security Assertion Markup Language / SAML 2.0 / Computing / Technical communication / Open formats

EIDR SYSTEM VERSIONREST API REFERENCE 2015 Jan. 15 Copyright © 2011–2015 by the Entertainment ID Registry Association (EIDR). Copyrights in this work are

Add to Reading List

Source URL: eidr.org

Language: English - Date: 2015-01-16 12:18:27
245System software / Microsoft SharePoint / Portal software / Active Directory Federation Services / Security Assertion Markup Language / Trusted Platform Module / Software / Computer security / Content management systems

CASE STUDY: JW Secure and the United States Department of Defense Introduction Our expertise in building ultra-secure systems made JW Secure the right choice

Add to Reading List

Source URL: www.jwsecure.com

Language: English - Date: 2014-12-16 20:21:54
246Philosophical logic / Modal logic / Analytic philosophers / Possibility / Meaning / Robert Stalnaker / Possible world / Semantics / Truth / Logic / Philosophy / Analytic philosophy

In ‘Assertion’, Robert Stalnaker distinguishes between the sema

Add to Reading List

Source URL: www.philosophy.ox.ac.uk

Language: English - Date: 2009-04-20 07:12:56
247Public safety / Computer security / Computing / Computer crimes / International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / NIST Special Publication 800-53 / Security Assertion Markup Language / Information security / Security / Crime prevention / National security

This is a Non-Standards Track Work Product. The patent provisions of the OASIS IPR Policy do not apply. This is a Non-Standards Track Work Product. The patent provisions of the OASIS IPR Policy do not apply.

Add to Reading List

Source URL: docs.oasis-open.org

Language: English - Date: 2014-05-28 12:00:00
248Public safety / Computer security / Computing / Computer crimes / International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / NIST Special Publication 800-53 / Security Assertion Markup Language / Information security / Security / Crime prevention / National security

This is a Non-Standards Track Work Product. The patent provisions of the OASIS IPR Policy do not apply. This is a Non-Standards Track Work Product. The patent provisions of the OASIS IPR Policy do not apply.

Add to Reading List

Source URL: docs.oasis-open.org

Language: English - Date: 2014-05-28 12:00:00
249Federated identity / Identity / Access control / Security Assertion Markup Language / Shibboleth / Single sign-on / PERMIS / Authentication / Information security / Security / Identity management / Computer security

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation (“Federation”) enables a federation participating organization ("Participant") to use Shibboleth identity attribute shar

Add to Reading List

Source URL: www.xsede.org

Language: English - Date: 2015-03-18 15:37:18
UPDATE