Identity management

Results: 13318



#Item
891

Identity Management Project Leadership Reduzierung von Projektrisiken durch die Nutzung von Best Practices Identity Management Praxisforum

Add to Reading List

Source URL: www.si-g.com

Language: German
    892

    Identity Management mehr als "nur" Compliance Seite 1

    Add to Reading List

    Source URL: www.genericiam.org

    Language: German - Date: 2011-07-12 12:45:33
      893

      Cloud Identity Minder – Strong Authentication and Self Service for SaaS and Web applications CionSystems Cloud Identity Minder is a cloud-based identity, authentication and self service user life cycle management solut

      Add to Reading List

      Source URL: www.cionsystems.com

      Language: English - Date: 2014-05-31 09:43:02
        894

        Information Sharing and User Privacy in the Third-party Identity Management Landscape Anna Vapen1 , Niklas Carlsson1 , Anirban Mahanti2 , and Nahid Shahmehri1 1 Link¨

        Add to Reading List

        Source URL: liu.diva-portal.org

        Language: English - Date: 2015-05-04 03:55:28
          895Software / System software / Computing / System administration / Identity management / Windows Vista / Computer access control / Computer security / Runas / PowerShell / User Account Control / Keyfile

          Bob McCoy Radio Engineering Industries, Inc.

          Add to Reading List

          Source URL: www.nebraskacert.org

          Language: English - Date: 2013-02-16 09:25:54
          896Privacy / Law / Identity management / Computing / Government / Internet privacy / Medical privacy / Personally identifiable information / P3P / Do Not Track legislation

          Privacy Policy RefugeeOne respects the privacy of every visitor to our website. Protecting your private information is our priority. This statement of Privacy applies to the www.refugeeone.org and RefugeeOne and governs

          Add to Reading List

          Source URL: www.refugeeone.org

          Language: English - Date: 2013-05-29 09:56:07
          897Security / Prevention / Secure communication / Computer security / Crime prevention / National security / Audit / Identity management / User Activity Monitoring / Privileged identity management

          Fischer Identity™ Turn Identity Management into a Strategic Advantage Access Termination

          Add to Reading List

          Source URL: www.fischerinternational.com

          Language: English - Date: 2012-05-10 11:22:05
          898Cryptography / Computer security / Computing / Computer access control / Notary / Public-key cryptography / Identity management / Direct Anonymous Attestation / Password / Internet Relay Chat / Security token / Proxy server

          BNymble (a short paper) More anonymous blacklisting at almost no cost Peter Lofgren and Nicholas Hopper University of Minnesota Abstract. Anonymous blacklisting schemes allow online service providers

          Add to Reading List

          Source URL: www-users.cs.umn.edu

          Language: English - Date: 2010-12-16 18:40:43
          899Privacy / Identity management / Law / Internet privacy / Personally identifiable information / Medical privacy / Email / Privacy concerns with social networking services / Information privacy

          PRIVACY POLICY The fact that you have trusted The Food Co-op with your personal information is very important to us, and we take multiple steps to maintain its security. We will not sell or otherwise share personally ide

          Add to Reading List

          Source URL: foodcoop.coop

          Language: English - Date: 2014-09-10 20:49:31
          900Database / Identity management / Data management

          Informatics  for  Integrating  Biology  and  the  Bedside   i2b2 Software Architecture Identity Management Framework (IM) Cell

          Add to Reading List

          Source URL: www.i2b2.org

          Language: English - Date: 2013-12-27 10:29:21
          UPDATE