Identity management systems

Results: 1028



#Item
111Identity management / Social issues / Law / Computer law / Security / Privacy / Personally identifiable information / Data quality / Data Protection Act / Ethics / Data privacy / Privacy law

Code of Conduct for the Protection of the Individual’s Right to Privacy in the Handling of Personal Data within the Deutsche Telekom Group Preamble and Recitals (1) Due to increasing networking of information and commu

Add to Reading List

Source URL: www.t-systems.co.za

Language: English - Date: 2013-10-22 09:24:28
112Computer security / Crime prevention / National security / Identity assurance / Federated identity management / OpenID / Defense Information Systems Agency / Transglobal Secure Collaboration Project / Security / Identity management / Identity

TSCP_logo_cmyk_Participation_whitetext.eps

Add to Reading List

Source URL: www.tscp.org

Language: English - Date: 2015-05-26 17:06:02
113Finance / Identity management / Electronic commerce / Payment systems / Internet privacy / Credit bureau / Privacy / Information security / Bank / Financial economics / Ethics / Credit

Microsoft Word - 8.5x11 Privacy Notice 2014_v2

Add to Reading List

Source URL: www.brooklinebank.com

Language: English - Date: 2014-12-09 18:27:42
114Password / Identity management systems / Cryptographic software / Password policy / Password strength / Security / Computer security / Access control

SchoolView Set up for Students Step 1: Go to the PCSH website and select SchoolView from the right column: Step 2: Select SchoolView Login: 1

Add to Reading List

Source URL: schools.district279.org

Language: English - Date: 2015-01-20 12:49:28
115CORBA / Common Object Request Broker Architecture / Component-based software engineering / Inter-process communication / Object-oriented programming / Authorization / Access control / Service-oriented architecture / Computer security / Security / Computing / Identity management

In Proceedings of the Annual Computer Security Applications Conference, Phoenix, Arizona, U.S.A., December 6-10, 1999 A Resource Access Decision Service for CORBA-based Distributed Systems Konstantin Beznosov Baptist He

Add to Reading List

Source URL: cadse.cs.fiu.edu

Language: English - Date: 2000-01-27 15:46:10
116Social issues / Electric power transmission systems / Internet privacy / Electrical grid / Privacy policy / FTC Fair Information Practice / Ethics / Privacy / Identity management

Before  the  Public  Utility  Commission    Utility  Commission   Order  Instituting  Rulemaking  to   Consider  Smart  Grid  Technologies   Pursuant  to  Federal

Add to Reading List

Source URL: www.epic.org

Language: English - Date: 2010-03-25 12:14:39
117Privacy / BPAY / Finance / Business / Identity management / Social issues / Cheque / Internet privacy / Personally identifiable information / Payment systems / Banking / Ethics

Deposit Complete this form to make an irregular contribution. If you wish to make regular voluntary contributions, please complete the Voluntary Contributions form. Return this completed form by: EMAIL

Add to Reading List

Source URL: maritimesuper.com.au

Language: English - Date: 2015-01-15 04:39:55
118Computer security / Identity management / Mandatory access control / Database / Capability-based security / Security / Database management systems / Access control

On the Unification of Access Control and Data Services David Ferraiolo1, Serban Gavrila1, Wayne Jansen2 1 National Institute of Standards and Technology

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-28 16:26:44
119Identity management / Computing / Role-based access control / Middleware / PERMIS / Enterprise JavaBeans / Credential / Security / Access control / Systems engineering

Supporting Heterogeneous Middleware Security Policies in WebCom Simon N. Foley∗, Barry P. Mulcahy, Thomas B. Quillinan, Meabh O’Connor, and John P. Morrison Department of Computer Science, University College, Cork, I

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2006-08-23 05:01:03
120Identity management / Computer security / Security Assertion Markup Language / SAML 1.1 / SAML 2.0 / Computing / System software / Identity management systems

PDF Document

Add to Reading List

Source URL: docs.oasis-open.org

Language: English - Date: 2009-11-13 15:56:24
UPDATE