Digital identity

Results: 1391



#Item
591Identity management / Security / XACML / Technical communication / Digital rights management / Interoperability / Privacy / Social networking service / Authorization / Telecommunications / Computing / Technology

Using XACML for access control in Social Networks Anna Carreras, Eva Rodríguez, Jaime Delgado Distributed Multimedia Applications Group (DMAG) Universitat Politècnica de Catalunya (UPC)

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2009-11-17 09:46:02
592Identity / Identity theft / Theft / Real estate broker / Personally identifiable information / National Association of Realtors / Safety / Grand Theft Auto IV / Ethics / Digital media / Crimes

Article #6: REALTOR® Safety: Knowledge Awareness Empowerment 14 Simple Steps for Safeguarding Your Office By now, you are aware of potential dangers that face real estate agents when they are meeting clients, showing p

Add to Reading List

Source URL: www.realtor.org

Language: English - Date: 2012-03-09 12:07:32
593Logic / Identity management / Information Card / Medicalization / Online identity / Digital identity / Identity / Security / Abstraction

Microsoft Word - The Future of Identity19-web

Add to Reading List

Source URL: www.nickbostrom.com

Language: English - Date: 2011-12-15 21:20:18
594Integrated Services Digital Network / Mobile technology / Universal Mobile Telecommunications System / GSM / Subscriber identity module / SMS / Basic Rate Interface / S0 / Electronic engineering / Technology / Videotelephony

ISDN BRI Gateways Digital Way to GSM or UMTS Networks Sophisticated LCR Free minutes counting Auto CLIP routing

Add to Reading List

Source URL: r-onetrading.com

Language: English - Date: 2014-01-05 23:08:33
595Access control / Computer security / Identity management / Computer keyboard / Remote keyless system / Switch / Electronic engineering / Security / Radio electronics

PRINTERS INSTRUCTIONS: INSTR,INSTL,AK-11,ACCESS - LINEAR P/N: [removed]A - INK: BLACK - MATERIAL: 20 LB. MEAD BOND - SIZE: 8.500” X[removed]” - SCALE: 1-1 - FOLDING: ALBUM-FOLD - BINDING: SADDLE-STITCH AK-11 Digital Keyl

Add to Reading List

Source URL: www.linearcorp.com

Language: English - Date: 2008-08-20 16:25:25
596Information technology / Open government / Communication / International Telecommunication Union / United Nations Development Group / E-Services / Information security / Technology / Digital divide / Computing

REGIONAL seminar on “Identity Management and e-Signatures”

Add to Reading List

Source URL: www.ituarabic.org

Language: English - Date: 2007-11-06 08:27:04
597Virtual reality / American art / Contemporary art / Digital media / New media / Pierre Bourdieu / Online identity / Digital native / Internet / Anthropology / Science / Technology

networks of association, 477 nobrow culture, 86–87 affect, viral marketing, 451, 458–459 affective labor, 21 affordances audience studies, 111–112

Add to Reading List

Source URL: media.wiley.com

Language: English - Date: 2013-08-31 07:19:22
598Access control / Computer security / Identity management / Computer keyboard / Keypad / Relay / Remote keyless system / Electromagnetism / Electrical engineering / Electronic engineering

PRINTER’S INSTRUCTIONS: INSTR,INSTL,AK-31 - LINEAR P/N: [removed]A - INK: BLACK - MATERIAL: 20 LB. MEAD BOND - SIZE: 8.500” X[removed]” - SCALE: 1-1 - FOLDING: ALBUM-FOLD - BINDING: SADDLE-STITCH AK-31 Digital Keyless

Add to Reading List

Source URL: www.linearcorp.com

Language: English - Date: 2008-08-20 16:26:14
599Identity theft / Theft / Social networking service / Grand Theft Auto IV / Internet privacy / Text messaging / Application software / Digital media / Crimes / Identity

Parents Can Now Easily Monitor Their Child’s Social Network and Mobile Phone Activity SocialScout will launch at National PTA Annual Convention, June[removed]San José, CA (PRWEB) June 21, [removed]IDentity Theft 911, a n

Add to Reading List

Source URL: www.prweb.com

Language: English - Date: 2012-06-21 06:01:22
600Logic / Personal identity / Counterpart theory / Naming and Necessity / Derek Parfit / Philosophy of self / Digital identity / Identity control theory / Identity / Philosophy / Metaphysics

part ii identity 210 identity As Marsha Hanen points out near the end of Part I, new technologies that have

Add to Reading List

Source URL: idtrail.org

Language: English - Date: 2009-03-27 16:30:49
UPDATE