Assertion

Results: 1026



#Item
291Identity / Identity management / Cloud standards / Web services / Internet protocols / OpenID / Information Card / Security Assertion Markup Language / Windows CardSpace / Federated identity / Computing / Computer security

www.interentidentityworkshop.com Book of Proceedings http://iiw.idcommons.net/Notes_iiw9 Complied by Heidi Nobantu Saul

Add to Reading List

Source URL: iiw.idcommons.net

Language: English - Date: 2009-12-10 04:45:05
292Software engineering / Assertion / Debugging / Software bug / Postcondition / Theoretical computer science / Computer programming / Logic in computer science

Extracted from: Debug It! Find, Repair, and Prevent Bugs in Your Code This PDF file contains pages extracted from Debug It!, published by the Pragmatic

Add to Reading List

Source URL: media.pragprog.com

Language: English - Date: 2009-08-04 11:58:23
293Identity management / Federated identity / Java enterprise platform / Cloud standards / Security Assertion Markup Language / SAML 2.0 / OAuth / Spring Security / OpenID / Computing / Computer security / System software

Spring Security This in-depth, 4-day course introduces the Java web developer to the Spring Security framework. We start with an overview and practical exercises in basic usage: XML configuration for authentication and

Add to Reading List

Source URL: www.batky-howell.com

Language: English - Date: 2014-03-25 11:30:36
294Identity / Federated identity / Access control / Security Assertion Markup Language / Shibboleth / SAML 2.0 / Single sign-on / Public key certificate / Authentication / Security / Identity management / Computer security

Microsoft Word - Benelogic_incommon_pop.docx

Add to Reading List

Source URL: www.benelogic.com

Language: English - Date: 2012-12-05 16:48:03
295SPIN model checker / OCaml / Model checking / Application programming interfaces / Secure Shell / Promela / Assertion / Type system / C / Computing / Software / Model checkers

SPLAT: A Tool for Model-Checking and Dynamically-Enforcing Abstractions Anil Madhavapeddy1 , David Scott2 , and Richard Sharp3 1 Computer Laboratory, University of Cambridge

Add to Reading List

Source URL: dave.recoil.org

Language: English - Date: 2011-10-25 12:01:10
296Logic in computer science / Software testing / Assertion / Debugging / Extreme programming / Fault / Software bug / Reliability engineering / Source lines of code / Software engineering / Computer programming / Theoretical computer science

Assessing the Relationship between Software Assertions and Code Quality: An Empirical Investigation Gunnar Kudrjavets 1, Nachiappan Nagappan 2, Thomas Ball 2 1 Microsoft Corporation, Redmond, WA

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2006-06-13 14:40:59
297Internet / Data / RADIUS / Computer network security / Transmission Control Protocol / Extensible Authentication Protocol / Security Assertion Markup Language / Firewall / Diameter / Computing / Internet protocols / Internet standards

Internet Engineering Task Force (IETF) Request for Comments: 7499 Category: Experimental ISSN: A. Perez-Mendez, Ed.

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2015-04-06 16:44:02
298Computing / Identity assurance / Liberty Alliance / Peer-to-peer / Security Assertion Markup Language / Cloud computing / Information Card / OpenID / Identity management / Identity / Computer security

A Field Guide to Internet Trust by Kaliya “Identity Woman” Hamlin and Steve Greenberg Summary The decreasing cost of computation and communication has made it easier than ever before to be a service provider, and has

Add to Reading List

Source URL: www.identitywoman.net

Language: English - Date: 2014-05-05 14:05:14
299Cross-platform software / Java / Null / Pointer / Bytecode / C / Parameter / Assertion / Computing / Software engineering / Computer programming

Nullness Analysis of Java Bytecode via Supercompilation over Abstract Values? Ilya G. Klyuchnikov JetBrains; Keldysh Institute of Applied Mathematics of RAS Abstract. Code inspections in the upcoming release of IntelliJ

Add to Reading List

Source URL: meta2014.pereslavl.ru

Language: English - Date: 2014-06-15 20:00:00
300System software / Digital identity / Trust law / Phorm / Security Assertion Markup Language / Law / Identity management / Computer security

Trust Framework Requirements and Guidelines V1 (DRAFT 01) Introduction In the context of digital identity systems, a trust framework is a certification program that enables a party who accepts a digital identity credenti

Add to Reading List

Source URL: openidentityexchange.org

Language: English - Date: 2014-06-06 18:30:57
UPDATE