Identity management systems

Results: 1028



#Item
131System software / Identity management / Security / XACML / PERMIS / Shibboleth / Security Assertion Markup Language / Annotation / Annotea / Federated identity / Computer security / Identity management systems

Implementing a Secure Annotation Service Imran Khan, Ronald Schroeter, Jane Hunter The School of ITEE The University of Queensland, St Lucia, Queensland, Australia {imrank, jane}@itee.uq.edu.au

Add to Reading List

Source URL: dart.edu.au

Language: English - Date: 2006-12-03 10:50:15
132Identity management / Identity management systems / Computer network security / Password / Cloud computing security / Security Assertion Markup Language / Cloud computing / Phishing / Anakam / Security / Computing / Computer security

Whitepaper The Next Generation of Cloud Security: Best Practices for Fending off Hackers

Add to Reading List

Source URL: www.aquion.com.au

Language: English - Date: 2014-07-14 19:31:45
133Identity management systems / System software / Shibboleth / Identity management / Security Assertion Markup Language / Lp / Athens / Federated identity / Computer security / Computing

Microsoft Word - Invitation.docx

Add to Reading List

Source URL: shibboleth.net

Language: English - Date: 2015-05-19 04:12:47
134Identity management systems / Identity management / Provisioning / Telecommunications / Software as a service / Cloud computing / NATES / MachPanel / User provisioning software / Software / Computing / Centralized computing

SailPoint-Address-Block-new

Add to Reading List

Source URL: www.edvance.com.hk

Language: English - Date: 2014-08-11 08:24:10
135Customer experience management / Money / Customer experience / Credit card / Cheque / Money laundering / Identity document / Business / Marketing / Payment systems

WorldRemit Jumio Case Study_V3.indd

Add to Reading List

Source URL: pages.jumio.com

Language: English - Date: 2015-05-23 08:48:47
136Superuser / Identity management / Security / System software / Privileged password management / Privileged Identity Management / Computer security / Cyber-Ark / Password

Enterprise Password Vault® The Challenge Enforce an enterprise policy that protects your most critical systems,

Add to Reading List

Source URL: www.edvance.com.hk

Language: English - Date: 2014-09-04 05:00:16
137Kerberos / Access token / Computer security / OpenAFS / Cyberwarfare / Network file systems / Computing / Computer network security

Khimaira Identity Management Framework

Add to Reading List

Source URL: www.secure-endpoints.com

Language: English - Date: 2006-01-06 01:24:50
138Social issues / Electric power transmission systems / Internet privacy / Electrical grid / Privacy policy / FTC Fair Information Practice / Ethics / Privacy / Identity management

Before  the  Public  Utility  Commission    Utility  Commission   Order  Instituting  Rulemaking  to   Consider  Smart  Grid  Technologies   Pursuant  to  Federal

Add to Reading List

Source URL: epic.org

Language: English - Date: 2010-03-25 12:14:39
139Standards / Crimes / Identity theft / Systems engineering process / Information Technology Infrastructure Library / Abstraction / Security / Identity / Information technology management / Method engineering

Evidence of Identity Standard Version 2.0 Department of Internal Affairs December 2009 Version 2.0

Add to Reading List

Source URL: www.dia.govt.nz

Language: English - Date: 2010-02-01 22:29:57
140Privacy / Computing / Identity management / Social issues / Banking / Cheque / Internet privacy / Privacy policy / Email / Ethics / Payment systems / Finance

TRANSFER ORDER AMENDMENT Staff Use Only Order Number ACCOUNT HOLDER(S) Given Name(s) Surname

Add to Reading List

Source URL: www.qtmb.com.au

Language: English - Date: 2014-12-15 00:07:45
UPDATE