Identity management

Results: 13318



#Item
31

Global Federated Identity and Privilege Management (GFIPM)Task Team

Add to Reading List

Source URL: it.ojp.gov

- Date: 2016-01-27 08:29:08
    32

    Identity – Authentication Management Identity Management is a centrally controlled enterprise capability used at all echelons (via standard policy enforcement points that leverage Army Knowledge Online, Common-Access

    Add to Reading List

    Source URL: netcom.army.mil

    - Date: 2009-10-26 18:13:04
      33

      Founded in 1989, MicroStrategy is a leading worldwide provider of enterprise software platforms. Our mission is to provide the most flexible, powerful, scalable, and user-friendly analytics and identity management platfo

      Add to Reading List

      Source URL: praca.wwsi.edu.pl

      - Date: 2016-05-30 10:58:18
        34

        Identity Management/Active Directory Roadmap, May 2011

        Add to Reading List

        Source URL: cio.unm.edu

        - Date: 2013-09-25 13:30:37
          35

          NOTICE TO APPLICANTS FOR COURSES FY 2013 and future NFA OR EMI COURSES To reduce the risk of identity theft, FEMA, the National Fire Academy (NFA), and the Emergency Management Institute (EMI) are eliminating the use of

          Add to Reading List

          Source URL: www.owrb.ok.gov

          - Date: 2015-02-18 12:41:29
            36Security / Prevention / Safety / Identity management / Cryptography / Computer security / National security / Password / Access control / Information security / Identity management system / Su

            PDF Document

            Add to Reading List

            Source URL: its.sjsu.edu

            Language: English - Date: 2015-12-07 11:37:15
            37Security / Computer security / Access control / Computer access control / Identity management / XACML / Authorization / Privacy / Information visualization / Internet privacy / Situation awareness

            Information Visualization for Rule-based Resource Access Control Jaime Montemayor, Andrew Freeman, John Gersh, Thomas Llanso, Dennis Patrone The Johns Hopkins University Applied Physics LaboratoryJohns Hopkins Roa

            Add to Reading List

            Source URL: cups.cs.cmu.edu

            Language: English - Date: 2006-06-02 15:04:21
            38Identity management systems / Identity management / Computing / ForgeRock / Marketing / Software / Customer support / Software bug

            PRODUCT SUPPORT DATASHEET Support One Solution to Protect Them All Execute your next identity and access management deployment with confidence knowing that ForgeRock Product Support is close at hand throughout the proje

            Add to Reading List

            Source URL: www.forgerock.com

            Language: English - Date: 2015-06-10 14:58:36
            39Privacy / Identity management / Privacy Office of the U.S. Department of Homeland Security / United States Department of Homeland Security / Business / Economy / Internet privacy / Privacy Impact Assessment / Chief privacy officer / Personally identifiable information / Management / Medical privacy

            UNITED STATES DEPARTMENT OF COMMERCE Chief Financial Officer and Assistant Secretary for Administration Washington, D.CNOV

            Add to Reading List

            Source URL: cio.noaa.gov

            Language: English - Date: 2015-09-25 15:57:53
            40Identity management / Computer access control / Identity / Privacy / Computing / Digital rights / Human rights / Law / Kantara Initiative / Internet privacy / Internet Governance Forum / User-Managed Access

            ITAC SPEAKING NOTES FOR THE OCED PRIVACY CONFERENCE IN ISRAELOCTOBER 2010 PANEL IV – FOSTERING INNOVATION IN PRIVACY PROTECTION “This session will examine some innovative approaches being taken by organisation

            Add to Reading List

            Source URL: www.internetac.org

            Language: English - Date: 2014-04-23 18:14:13
            UPDATE