Identity management

Results: 13318



#Item
301Computing / Identity management / Computer access control / Security Assertion Markup Language / SOAP / WS-Security / XML schema

An Incremental Learner for Language-Based Anomaly Detection in XML Harald Lampesberger Department of Secure Information Systems University of Applied Sciences Upper Austria

Add to Reading List

Source URL: spw16.langsec.org

Language: English - Date: 2016-06-05 23:39:24
302Finance / Money / Personal finance / Economy / Credit / Banking / Privacy / Identity management / Credit score / Credit history / Credit bureau / Internet privacy

RevFACTS WHAT DOES SAN ANTONIO FEDERAL CREDIT UNION DO WITH YOUR PERSONAL INFORMATION?

Add to Reading List

Source URL: www.sacu.com

Language: English - Date: 2014-12-08 09:54:31
303Cryptography / Key management / Public administration / Public-key cryptography / Transport Layer Security / Identity management / Identity document / Authentication / E-government / Smart card / Certificate authority / Citizen Card

The state-of-the-art online ID card A great success in Taiwan Easy, secure and user-friendly Background

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:47:41
304Intellectual property law / Free and open-source software licenses / Computing / Computer access control / Identity management / Patent law / Federated identity / OpenID / Copyright / License / Royalty payment / Patent infringement

DocuSign Envelope ID: 2F7C3201-9671-4F2A-A330-8A216DA3DAAA FinalSoftware Grant and Corporate Contribution License Agreement In order to clarify the intellectual property license granted with Contributions from

Add to Reading List

Source URL: openid.net

Language: English - Date: 2016-07-01 09:58:57
305Education / Politics / Identity politics / Cultural studies / Multiculturalism / Human resource management / Education policy / Discrimination / Cultural diversity / Diversity / Inclusion / Biodiversity

Microsoft Word - JADE document 2011 Final copy.doc

Add to Reading List

Source URL: diversity.uic.edu

Language: English - Date: 2016-05-06 17:51:07
306Identity management / Law / Privacy / Canvassing / Internet privacy / Politics

400 Appendix J (PageComplaint Cases Provided by

Add to Reading List

Source URL: www.eac.gov.hk

Language: English - Date: 2016-06-26 22:58:51
307Computing / Privacy / Information / Data security / Data protection / Identity management / Internet privacy / Information privacy / Medical privacy / Open data / Personally identifiable information / Big data

Briefing Paper on Open Data and Privacy This paper is one of a series of four Briefing Papers on key issues in the use of open government data. The U.S. federal government, like many governments around the world, now rel

Add to Reading List

Source URL: www.opendataenterprise.org

Language: English - Date: 2016-08-19 00:49:50
308Health care / Health / Medicine / Health informatics / Identity management / Law / Privacy / Medical privacy / Medical record / Health Insurance Portability and Accountability Act / Communication privacy management theory

Conor Logan, L.Ac. Lic. No. AC16258NOTICE OF PRIVACY PRACTICES I. Understanding Your Health Record/Information

Add to Reading List

Source URL: www.conorloganlac.com

Language: English - Date: 2016-02-03 15:23:10
309Computer access control / Identity management / Identity / Federated identity / Shibboleth / Identity management systems / SAML-based products and services

Identity Services Overview from 3rd Party UK federation commercial identity Providers SHIBBOLETH IdP V3

Add to Reading List

Source URL: www.overtsoftware.com

Language: English - Date: 2015-12-16 10:13:16
310Identity management / Law / Privacy / MAC address / IEEE 802 / Internet privacy

IEEE 802ECSG Privacy Recommendation Minutes of EC Privacy Recommendation SG Teleconference December 10th, 2014 Date: 13-January-2015 Author(s):

Add to Reading List

Source URL: mentor.ieee.org

Language: English - Date: 2015-01-13 11:59:31
UPDATE