Assertion

Results: 1026



#Item
501

NORMS OF ASSERTION: A WORKSHOP IN EPISTEMOLOGY IN Genève

Add to Reading List

Source URL: www.unige.ch

- Date: 2010-05-25 13:54:38
    502Computer security / Federated identity / Identity 2.0 / Federated identity management / Information Card / Authentication / OpenID / Security Assertion Markup Language / Privacy / Identity management / Security / Identity

    Microsoft Word - Edentity HP IdM paper for web.doc

    Add to Reading List

    Source URL: ico.org.uk

    Language: English - Date: 2014-11-18 05:19:55
    503ISO/TC 211 / Cartography / Computing / Measurement / Web Feature Service / Security Assertion Markup Language / Web Map Service / GeoXACML / XACML / Open Geospatial Consortium / Geographic information systems / GIS software

    How to protect OGC web services[removed]Jari Reini Agenda  Geospatial web services

    Add to Reading List

    Source URL: external.opengis.org

    Language: English - Date: 2012-09-04 03:28:23
    504Critical thinking / Philosophical logic / Theories of truth / Justification / Metatheory / Theory of justification / Norm / Assertion / Modal logic / Philosophy / Logic / Epistemology

    ENGEL In what sense is knowledge the norm of assertion1

    Add to Reading List

    Source URL: www.unige.ch

    Language: English - Date: 2008-09-01 07:57:05
    505Computing / Trust negotiation / Credential / Access control / XACML / Security Assertion Markup Language / RADIUS / Negotiation / Authorization / Identity management / Security / Computer security

    Enhancing access control for mobile devices with an agnostic trust negotiation decision engine.

    Add to Reading List

    Source URL: dl.ifip.org

    Language: English - Date: 2014-08-10 19:38:20
    506Identity management / Security Assertion Markup Language / Computing

    For Educational Use Only www.MaineMemory.net Copyright 2009 Dec 4, 1751 Phips r

    Add to Reading List

    Source URL: www.mainememory.net

    Language: English - Date: 2010-08-26 02:41:55
    507Identity management / Identity management systems / Federated identity / WS-Trust / WS-SecurityPolicy / WS-Security / WS-Addressing / WS-Policy / Security Assertion Markup Language / Computer security / Security / Computing

    WS-Trust 1.4 OASIS Standard

    Add to Reading List

    Source URL: docs.oasis-open.org

    Language: English - Date: 2009-03-05 22:07:00
    508Web standards / Identity management / Identity management systems / Web services / WS-SecurityPolicy / Security Assertion Markup Language / WS-Security / WS-Policy / WS-Trust / Computing / Security / Computer security

    WS-SecurityPolicy 1.3 OASIS Standard

    Add to Reading List

    Source URL: docs.oasis-open.org

    Language: English - Date: 2009-03-05 20:32:51
    509Source code / Data types / Procedural programming languages / C programming language / C / Assertion / Pointer / Recursion / Subroutine / Computer programming / Computing / Software engineering

    SOFTWARE TECHNOLOGIES The Power of 10: Rules for Developing SafetyCritical Code Gerard J. Holzmann

    Add to Reading List

    Source URL: spinroot.com

    Language: English - Date: 2008-06-30 15:34:26
    510Identity management systems / Identity / Security Assertion Markup Language / SAML 2.0 / SAML 1.1 / Kantara Initiative / OASIS / PERMIS / Identity provider / System software / Computer security / Identity management

    3 SAML V2.0 Identity Assurance Profiles Version[removed]

    Add to Reading List

    Source URL: docs.oasis-open.org

    Language: English - Date: 2010-11-11 21:14:17
    UPDATE