Identity 2.0

Results: 599



#Item
51Identity management / Social issues / Web 2.0 / Internet privacy / Privacy / Google / Facebook / ICANN / Telecommunications data retention / Computing / Internet / Digital media

Michele Neylon to Speak at SXSW Interactive Blacknight CEO to discuss the “broken” state of Internet Use in the age of Free Platform abuse 06 MARCH 2015, CARLOW,IRELAND SUMMARY

Add to Reading List

Source URL: d21buns5ku92am.cloudfront.net

Language: English - Date: 2015-03-06 05:01:34
52Smartphones / Mobile telecommunications / Subscriber identity module / Dual SIM / UICC / Mobile phone / Nokia N900 / Mobile phone features / Technology / Electronic engineering / Electronics

Nokia C2–03 User Guide Issue 1.0 2

Add to Reading List

Source URL: www.dual-sim.nl

Language: English - Date: 2011-09-22 02:45:06
53Digital media / Privacy / Identity management / Social issues / Web 2.0 / HTTP cookie / Online shopping / Email / Google Analytics / Computing / Internet / Internet privacy

CATAWIKI PRIVACY POLICY version datedCatawiki takes your privacy very seriously and will process and use information about you in a secure manner. This document sets out the privacy policy of Catawiki (herein

Add to Reading List

Source URL: auction.catawiki.co.uk

Language: English - Date: 2013-11-27 17:06:02
54Identity / Security / Identity assurance / Security Assertion Markup Language / Authentication / Identity provider / Shibboleth / Password / SAML 2.0 / Identity management / Computer security / Federated identity

SWAMID Basic Identity Assurance Profile v1.0 Document SWAMID Basic Identity Assurance Profile v1.0

Add to Reading List

Source URL: www.swamid.se

Language: English - Date: 2011-09-25 04:56:52
55Integrating the Healthcare Enterprise / Security Assertion Markup Language / DICOM / SAML 2.0 / Health Level 7 / Healthcare Information and Management Systems Society / Identity provider / Liberty Alliance / Retrieve Information for Display / Medical informatics / Medicine / Health

Cross-Enteprise User Authentication

Add to Reading List

Source URL: www.ihe.net

Language: English - Date: 2005-08-15 18:36:30
56Internet / Password / Webmail / World Wide Web / Federated identity / Apple ID / Disposable email address / Computing / Email / Web 2.0

Law Firm Administrator Documentation

Add to Reading List

Source URL: www.flclerks.com

Language: English - Date: 2015-04-27 11:54:48
57Computing / Identity management systems / Identity management / Security Assertion Markup Language / SAML 2.0 / Identity provider / OpenID / SAML-based products and services / Single sign-on / Computer security / System software / Federated identity

Security Analysis of Web-based Identity Federation Apurva Kumar IBM Research - India New Delhi, India Email:

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2013-05-23 04:10:01
58Registered user / Internet / Federated identity / Web 2.0 / Email / Password / Computing

Department of Children and Families/ Agency for Persons with Disabilities Care Provider Background Screening Clearinghouse DCF/APD User Registration Guide:

Add to Reading List

Source URL: www.ahca.myflorida.com

Language: English - Date: 2015-05-15 14:08:40
59Web 2.0 / Password / Online shopping / Identity management / Internet privacy / Gmail / Computing / Internet / Email

11878_EmployerEnrollmentGuide-508

Add to Reading List

Source URL: marketplace.cms.gov

Language: English - Date: 2015-02-27 10:00:09
60Identity / Federated identity / Security Assertion Markup Language / SAML 2.0 / Shibboleth / Identity provider / Service provider / Authentication / Identity assurance / Identity management / System software / Computer security

GOV.UK Verify Architecture Overview High level architecture overview GOV.UK Verify enables a user to be identified at a service provider with a required  level of assurance, but without revealing any

Add to Reading List

Source URL: alphagov.github.io

Language: English - Date: 2015-06-08 12:02:04
UPDATE