Federated identity management

Results: 887



#Item
211Identity management / Identity / Security Assertion Markup Language / SAML 2.0 / Shibboleth / Identity provider / Service provider / Provisioning / Single sign-on / System software / Computer security / Federated identity

DATA SHEET SAML Single Sign-On (SSO) for Aspera Web Applications SAML (Security Assertion Markup Language)

Add to Reading List

Source URL: asperasoft.com

Language: English - Date: 2014-05-01 18:34:46
212Identity management / Public-key cryptography / Cryptographic protocols / Security Assertion Markup Language / Digital identity / OpenID / X.509 / Internet privacy / Assertion / Cryptography / Federated identity / Computer security

Selective Disclosure (v0.2) Ben Laurie () May 11, 2007 Abstract

Add to Reading List

Source URL: www.links.org

Language: English - Date: 2007-05-11 06:26:34
213Cloud clients / Google Chrome / Chromebook / Google / Laptops / Federated identity / Google Chrome OS / Network security / Single sign-on / Software / Computing / Cloud computing

iboss Addresses Security Risks Associated With Rising Chromebook Adoption New Chromebook SSO Authentication feature increases security and BYOD policy management for K-12 schools San Diego, CA – August 27, 2014 — ibo

Add to Reading List

Source URL: residential.iphantom.com

Language: English - Date: 2015-04-20 16:17:16
214Identity management / Computing / OpenID / Web services / Phorm / Identity assurance / Digital identity / Information Card / ICAM / Federated identity / Identity / Computer security

Trust Framework Provider Assessment PackageThis document comprises the Assessment Package submitted by the Open Identity Exchange Corporation (OIX) to the United States Office of Governmentwide Policy (OGP) p

Add to Reading List

Source URL: openidentityexchange.org

Language: English - Date: 2014-06-06 18:30:57
215Identity / Identity management / Cloud standards / Web services / Internet protocols / OpenID / Information Card / Security Assertion Markup Language / Windows CardSpace / Federated identity / Computing / Computer security

www.interentidentityworkshop.com Book of Proceedings http://iiw.idcommons.net/Notes_iiw9 Complied by Heidi Nobantu Saul

Add to Reading List

Source URL: iiw.idcommons.net

Language: English - Date: 2009-12-10 04:45:05
216Education / Computing / Virtual reality / Identity / Virtual world / Federated identity management / Moodle / E-learning / Digital identity / Software / Identity management / Federated identity

Cruz, G., Costa, A., Martins, P., Gonçalves, R., & Barroso, JToward Educational Virtual Worlds: Should Identity Federation Be a Concern? Educational Technology & Society, 18(1), 27–36. Toward Educational Vir

Add to Reading List

Source URL: www.ifets.info

Language: English - Date: 2015-03-16 22:09:22
217Identity management / Federated identity / Java enterprise platform / Cloud standards / Security Assertion Markup Language / SAML 2.0 / OAuth / Spring Security / OpenID / Computing / Computer security / System software

Spring Security This in-depth, 4-day course introduces the Java web developer to the Spring Security framework. We start with an overview and practical exercises in basic usage: XML configuration for authentication and

Add to Reading List

Source URL: www.batky-howell.com

Language: English - Date: 2014-03-25 11:30:36
218Ethics / Federated identity / Law / Privacy / Liberty Alliance / Internet privacy / Personally identifiable information / Biometrics / Digital identity / Security / Identity management / Identity

identity in digital government a research report of the Digital Government

Add to Reading List

Source URL: www.ljean.com

Language: English - Date: 2012-09-28 13:31:09
219Identity / Federated identity / Access control / Security Assertion Markup Language / Shibboleth / SAML 2.0 / Single sign-on / Public key certificate / Authentication / Security / Identity management / Computer security

Microsoft Word - Benelogic_incommon_pop.docx

Add to Reading List

Source URL: www.benelogic.com

Language: English - Date: 2012-12-05 16:48:03
220Identity management / Identity / Key management / Public-key cryptography / Information Card / Windows CardSpace / Identity management system / Public key certificate / Digital identity / Cryptography / Security / Federated identity

Oxford Internet Institute Conference – Safety and Security in a Networked World: Balancing Cyber-Rights and Responsibilities 8th-10th September 2005 Identity Management as a Cybersecurity Case Study By Mary Rundle and

Add to Reading List

Source URL: apache-ssl.securehost.com

Language: English - Date: 2009-01-02 13:32:35
UPDATE