<--- Back to Details
First PageDocument Content
Computer access control / Computer security / Identity management / Identity / Equity / Federated identity / Security Assertion Markup Language / Open standard / Trust / Open Identity Exchange / Identity assurance
Date: 2014-05-12 11:22:58
Computer access control
Computer security
Identity management
Identity
Equity
Federated identity
Security Assertion Markup Language
Open standard
Trust
Open Identity Exchange
Identity assurance

Final Trust Frameworkweb

Add to Reading List

Source URL: idfederation.org

Download Document from Source Website

File Size: 717,91 KB

Share Document on Facebook

Similar Documents

Synthesising Verified Access Control Systems in XACML Nan Zhang School of Computer Science University of Birmingham Birmingham, UK, B15 2TT

DocID: 1voGj - View Document

Towards Accelerated Usage Control Based on Access Correlations Richard Gay, Jinwei Hu, Heiko Mantel, and Johannes Schickel Department of Computer Science, TU Darmstadt, Germany

DocID: 1vgjd - View Document

Access Control and Key Management for Mobile Agents Volker Roth 1 and Mehrdad Jalali-Sohi 2 Fraunhofer Institute for Computer Graphics, Rundeturmstr. 6, 64283 Darmstadt, Germany

DocID: 1vfkA - View Document

Synthesising Verified Access Control Systems through Model Checking Nan Zhang, Mark Ryan∗ School of Computer Science University of Birmingham {nxz,mdr}@cs.bham.ac.uk

DocID: 1uYGS - View Document

Verification of agent knowledge in dynamic access control policies∗ Masoud Koleini, Eike Ritter and Mark Ryan School of Computer Science The University of Birmingham Birmingham, B15 2TT, UK

DocID: 1uPvL - View Document