Federated identity

Results: 1914



#Item
741Security / Password / Information Card / Internet privacy / Identity management / User / Login / Access token / Electronic authentication / Computing / Computer security / Federated identity

WP8 Combined Demo on IDM GE (NSN) Data Handling GE (SAP) Privacy GE (IBM) Sept. 29th 2014, v8

Add to Reading List

Source URL: abc4trust.eu

Language: English - Date: 2014-10-06 05:52:41
742UK Data Archive / Shibboleth / Athens / Compagnies Républicaines de Sécurité / Government / Statistics / E-Rate / Internet / Federated identity / Online databases / University of Essex

CENSUS REGISTRATION SERVICE:

Add to Reading List

Source URL: data-archive.ac.uk

Language: English - Date: 2010-06-02 12:45:51
743Internet / Federated identity / Technology / Password notification email / Password / Email / Computing

Guide to Accessing the Osher Online Video Library 1) Visit the Osher homepage: http://olli.ucsd.edu 2) Click on the Videos tab (located on the left hand side of the screen) 3) The user will be prompted to log in.

Add to Reading List

Source URL: olli.ucsd.edu

Language: English - Date: 2014-09-03 16:12:37
744Computer security / Identity / Federated identity / Security Assertion Markup Language / SAML 2.0 / SAML 1.1 / System software / Identity management systems / Identity management

SAML Executive Overview Introduction The credo “Think globally, act locally” has traditionally been associated with the environmental movement – providing a helpful principle for guiding effective advocacy efforts

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2005-03-10 18:32:53
745Software / Web 2.0 / Federated identity / Self-information / Ident / Entropy / Markov chain / Phishing / Facebook / Information theory / Computing / World Wide Web

How Unique and Traceable are Usernames? Daniele Perito, Claude Castelluccia, Mohamed Ali Kaafar, Pere Manils INRIA Rhone Alpes, Montbonnot, France {perito,ccastel,kaafar,manils}@inrialpes.fr Abstract. Usernames are ubiq

Add to Reading List

Source URL: planete.inrialpes.fr

Language: English - Date: 2011-06-28 12:57:13
746Cloud standards / Federated identity / Standards organizations / Electronic health record / Authentication / OpenID / OAuth / Identity management / Multi-factor authentication / Security / Computer security / Computing

Transport & Security Standards Workgroup

Add to Reading List

Source URL: www.healthit.gov

Language: English - Date: 2014-12-23 13:30:57
747Online databases / Identity management / University of Essex / Access control / Shibboleth / Economic and Social Data Service / UK Data Archive / Single sign-on / User / Security / Computer security / Federated identity

Identity Management Audit Report

Add to Reading List

Source URL: www.data-archive.ac.uk

Language: English - Date: 2011-10-04 04:16:13
748System software / Computing / University of Essex / Computer security / Shibboleth / Athens / UK Data Archive / Identity management / Joint Information Systems Committee / Federated identity / Identity management systems / Online databases

Project Identifier: Version: 01.01 Contact: David Hall Date 14 September[removed]JISC Final Report

Add to Reading List

Source URL: www.data-archive.ac.uk

Language: English - Date: 2011-10-04 04:15:40
749Identity management / Identity / Online databases / University of Essex / Shibboleth / UK Data Archive / Authentication / Credential / Single sign-on / Federated identity / Computer security / Security

Identity Management Audit Report

Add to Reading List

Source URL: www.data-archive.ac.uk

Language: English - Date: 2011-10-04 04:17:33
750Federated identity / Identity management / Mobile telecommunications / Social login / OpenID / Password / GSM Association / Authentication / Janrain / Technology / Security / Computing

PERSONAL DATA THE PROBLEM: THE SOLUTION: The password model is broken, with multiple login details, lengthy

Add to Reading List

Source URL: www.gsma.com

Language: English - Date: 2014-09-08 14:49:20
UPDATE