Assertion

Results: 1026



#Item
581National Instant Criminal Background Check System / Gun shows in the United States / Gun violence in the United States / Brady Handgun Violence Prevention Act / Gun Control Act / Gun law / Federal Firearms License / Concealed carry in the United States / Brady Campaign / Politics of the United States / Gun politics in the United States / Gun politics

WHAT WILL IT TAKE? TERRORISM, MASS MURDER, GANG VIOLENCE, AND SUICIDES: THE AMERICAN WAY, OR DO WE STRIVE FOR A BETTER WAY? Katherine L. Record* Lawrence O. Gostin** The assertion that access to firearms makes us safe, r

Add to Reading List

Source URL: prospectusmjlr.files.wordpress.com

Language: English - Date: 2014-04-06 18:00:52
582Identity management / Federated identity / OAuth / Social login / OpenID / Mobile application development / Security Assertion Markup Language / SAML-based products and services / Computing / Computer security / Cloud standards

DATA SHEET CA Layer 7 Mobile Access Gateway™ At a Glance The mobile app has become the central focus for new revenue opportunities, improving employee productivity and innovative

Add to Reading List

Source URL: www.ca.com

Language: English - Date: 2014-03-27 11:29:35
583World Wide Web / Identity / Identity management / Federated identity / Knowledge representation / Security Assertion Markup Language / Linked data / Authentication / OpenID / Semantic Web / Computing / Security

APA VIVO: A Semantic Framework for Scholarly Identity and Trusted Attribute Exchange Hal Warren and Eva Winer American Psychological Association, Washington, DC, USA {hwarren,ewiner}@apa.org

Add to Reading List

Source URL: 2012.eswc-conferences.org

Language: English - Date: 2012-07-23 09:47:35
584Federated identity / Identity management / Web services / Information Card / WS-SecurityPolicy / WS-Policy / WS-Trust / WS-Security / Security Assertion Markup Language / Security / Computing / Computer security

Identity Selector Interoperability Profile V1.5 July 2008 Authors Arun Nanda, Microsoft Corporation Michael B. Jones, Microsoft Corporation

Add to Reading List

Source URL: schemas.xmlsoap.org

Language: English - Date: 2008-08-08 20:04:46
585Security / Federated identity / Identity assurance / Digital identity / Authentication / Security Assertion Markup Language / Interoperability / Online identity / Federated identity management / Identity management / Identity / Computer security

The Imperative for Digital Identity in the StatesPart II NASCIO All States Briefing August 10, 2010

Add to Reading List

Source URL: www.nascio.org

Language: English - Date: 2010-08-11 11:53:45
586Software testing / Control flow / Daikon / Object-oriented programming / Software bug / Invariant / Assertion / Exception handling / Debugging / Software engineering / Computing / Computer programming

Tracking Down Software Bugs Using Automatic Anomaly Detection Sudheendra Hangal Monica S. Lam

Add to Reading List

Source URL: xenon.stanford.edu

Language: English - Date: 2004-06-02 08:33:41
587Computing / Wireless networking / Department of Defense Architecture Framework / Software / Security Assertion Markup Language / AmigaOS / MorphOS / Tag

Microsoft Word - FCD_AddendaDevelopmentApproachAndMethodology_v1.0.doc

Add to Reading List

Source URL: www.exchangenetwork.net

Language: English - Date: 2009-02-20 18:02:50
588Secure communication / Internet / Data / Internet protocols / Internet standards / Transport Layer Security / Security Assertion Markup Language / Password / SAML 2.0 / Computing / Teleconferencing / Cryptographic protocols

Zoom Security White Paper May 2013 Zoom offers the first Unified Meeting Experience (UMX), a cloud service that provides a 3-in-1 meeting platform with HD video conferencing, mobility and web meetings. UMX also offers th

Add to Reading List

Source URL: d24cgw3uvb9a9h.cloudfront.net

Language: English - Date: 2014-08-26 05:40:01
589Doe subpoena / Anonymous post / Lawsuit / Motion / Law / John Doe / Dendrite International /  Inc. v. Doe No. 3

Dendrite Intern., Inc. v. Doe No. 3, 342 N.J.Super[removed]A.2d 756, 17 IER Cases 1336, 29 Media L. Rep[removed]reputation through the assertion of recognizable claims based on the actionable conduct of the anonymo

Add to Reading List

Source URL: blogs.reuters.com

Language: English - Date: 2014-06-21 06:25:31
590Security / Identity assurance / Liberty Alliance / Security Assertion Markup Language / SAML 2.0 / OpenID / Interoperability / Authentication / Identity / Computer security / Identity management

Federal Identity, Credential, and Access Management Trust Framework Solutions Identity Scheme and Protocol Profile Adoption Process Version 2.0

Add to Reading List

Source URL: idmanagement.gov

Language: English - Date: 2014-02-10 10:07:30
UPDATE