IAM

Results: 906



#Item
681Abstraction / Provisioning / Telecommunications / Identity management

Provisioning and Integration: New Models and Practices IAM Online – June 12, 2013 Speakers: Rob Carter, Duke University

Add to Reading List

Source URL: www.incommon.org

Language: English - Date: 2013-06-12 12:07:17
682Internet2 / Science and technology in the United States / Integrated Digital Enhanced Network / Computer security / National Strategy for Trusted Identities in Cyberspace / Middleware / Privacy / Internet privacy / Computing / Identity management / Ethics / Consortia

Lifestyles  of  the  A-ribute  Rich     and  Privacy  Preserved   IAM  Online  –  June  11,  2014      

Add to Reading List

Source URL: www.incommon.org

Language: English - Date: 2014-06-11 10:20:47
683Anti-Deficiency Act / Appropriation bill / Government

Microsoft Word - 26 IAM 1-6 Budget Final[removed]

Add to Reading List

Source URL: www.indianaffairs.gov

Language: English - Date: 2014-10-01 23:20:10
684Authentication / Notary / Packaging / Multi-factor authentication / Identity management / Two-factor authentication / Anakam / Security / Computer security / Access control

Multi-Factor Authentication, Assurance, and the Multi-Context Broker IAM Online April 30, 2014 Keith Wessel, University of Illinois, Urbana-Champaign David Langenberg, University of Chicago

Add to Reading List

Source URL: www.incommon.org

Language: English - Date: 2014-04-30 14:11:06
685Government / 109th United States Congress / Appropriation bill / Continuing resolution

Microsoft Word - 26 IAM 1-6 Budget Final[removed]

Add to Reading List

Source URL: www.indianaffairs.gov

Language: English - Date: 2014-10-01 23:20:11
686Internet2 / Science and technology in the United States / Security Assertion Markup Language / Computing / Working group / Identity management / Identity management systems / Consortia

New InCommon Working Groups IAM Online August 13, 2014 Steve Carmody, Brown University Paul Caskey, University of Texas System Janemarie Duh, Lafayette College

Add to Reading List

Source URL: www.incommon.org

Language: English - Date: 2014-08-13 12:30:28
687Access control / Multi-factor authentication / Authentication / Strong authentication / Identity management / Password / Cryptography / Security / Computer security

IAM Online[removed]pptx

Add to Reading List

Source URL: www.incommon.org

Language: English - Date: 2013-09-11 14:20:11
688Architecture / Ventilation / Condensing boiler / Heat recovery ventilation / Water heating / Heat exchanger / Boiler / HVAC / Underfloor heating / Heating /  ventilating /  and air conditioning / Energy / Technology

2011 Canadian Consulting Engineering Awards Wi ll iam s Engineeri ng C anada 18 P 3 Co re A SA P Sch oo l s E dm onton & Calg ar y, Al berta Techni cal Categ o ry:

Add to Reading List

Source URL: www.canadianconsultingengineer.com

Language: English - Date: 2011-11-08 16:31:06
689

Implementing an Effective Identity and Access Management (IAM) Program An Update from the EDUCAUSE IAM Program Project Team Wednesday, October 10, 2012 – 3 p.m. ET David Sherry, Brown University Miguel Soldi, The Unive

Add to Reading List

Source URL: www.incommon.org

Language: English - Date: 2012-10-10 15:11:25
    690Educause / Futures contract / Technology / Consortia / Internet2 / Science and technology in the United States

    IAM Online December 13, 2013 Thank you to InCommon Affiliates for helping to make IAM Online possible. Brought to you by Internet2’s InCommon, in cooperation with EDUCAUSE www.incommon.org

    Add to Reading List

    Source URL: www.incommon.org

    Language: English - Date: 2013-12-13 11:50:48
    UPDATE