Assertion

Results: 1026



#Item
281Identity management / Computing / Identity / Shibboleth / Security Assertion Markup Language / Identity management system / Transport Layer Security / Service provider / Athens / Federated identity / Internet standards / Computer security

Microsoft Word - Hinweise fuer Verhandler und Anbieter en.doc

Add to Reading List

Source URL: www.konsortium-bw.de

Language: English - Date: 2010-05-15 10:52:05
282System software / Security Assertion Markup Language / Security / Keystore / Public key certificate / Service provider / SAML 2.0 / SAML-based products and services / Public-key cryptography / Identity management / Computer security

SSO Plugin Case study: Integrating with Ping Federate J System Solutions http://www.javasystemsolutions.com Version 4.0

Add to Reading List

Source URL: www.javasystemsolutions.com

Language: English - Date: 2014-01-20 14:08:32
283Security / Federated identity / OpenID / Security Assertion Markup Language / Digital identity / Phorm / Authentication / BT Group / Identity management / Computer security / Identity

Attribute Exchange Trust Framework Specification   DRAFT Technical Specification v 1.0 Document Version: 1.0 Serial No.

Add to Reading List

Source URL: www.openidentityexchange.org

Language: English - Date: 2014-06-06 18:30:57
284System software / Security Assertion Markup Language / Security / Keystore / Public key certificate / Service provider / SAML 2.0 / SAML-based products and services / Public-key cryptography / Identity management / Computer security

SSO Plugin Case study: Integrating with Ping Federate J System Solutions http://www.javasystemsolutions.com Version 4.0

Add to Reading List

Source URL: www.javasystemsolutions.com

Language: English - Date: 2014-01-20 14:08:32
285Security / Federated identity / Access control / Security Assertion Markup Language / SAML 2.0 / Shibboleth / SAML 1.1 / Authentication / CANARIE / Identity management / Computer security / Identity

Canadian Access Federation: Trust Assertion Document (TAD)

Add to Reading List

Source URL: www.rsc.org

Language: English - Date: 2014-12-22 04:46:06
286Identity management / Identity / Security Assertion Markup Language / SAML 2.0 / Shibboleth / Identity provider / Service provider / Provisioning / Single sign-on / System software / Computer security / Federated identity

DATA SHEET SAML Single Sign-On (SSO) for Aspera Web Applications SAML (Security Assertion Markup Language)

Add to Reading List

Source URL: asperasoft.com

Language: English - Date: 2014-05-01 18:34:46
287Software testing / Debugging / Extreme programming / Cross-platform software / Assertion / Logic in computer science / Program animation / Debugger / Unit testing / Computer programming / Computing / Software engineering

Proceedings Template - WORD

Add to Reading List

Source URL: www.subtext-lang.org

Language: English - Date: 2013-09-04 17:58:55
288Logic in computer science / Eiffel / Postcondition / Precondition / Recursion / Assertion / Lookup table / Rope / Exception handling / Software engineering / Computer programming / Computing

Software Tools for Technology Transfer manuscript No. (will be inserted by the editor) AutoProof Meets Some Verification Challenges Julian Tschannen · Carlo A. Furia · Martin Nordio

Add to Reading List

Source URL: se.inf.ethz.ch

Language: English - Date: 2014-01-14 06:58:45
289Identity management / Public-key cryptography / Cryptographic protocols / Security Assertion Markup Language / Digital identity / OpenID / X.509 / Internet privacy / Assertion / Cryptography / Federated identity / Computer security

Selective Disclosure (v0.2) Ben Laurie () May 11, 2007 Abstract

Add to Reading List

Source URL: www.links.org

Language: English - Date: 2007-05-11 06:26:34
290Password / Access control / Identity document / Security Assertion Markup Language / Two-factor authentication / Mobile identity management / Security / Identity management / Identity

Usher 2.2 Usher Mobile Identity Platform Usher™ is a mobile identity platform designed to provide security for every business process and system access across an enterprise. It replaces traditional forms of enterpris

Add to Reading List

Source URL: www.microstrategy.com

Language: English - Date: 2014-11-18 10:40:30
UPDATE