OAuth

Results: 220



#Item
51Cross-Site Scripting Attacks in Social Network APIs Yuqing Zhang Xiali Wang  University of Chinese Academy of Sciences

Cross-Site Scripting Attacks in Social Network APIs Yuqing Zhang Xiali Wang University of Chinese Academy of Sciences

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2013-05-23 04:10:01
52Collaboration designed to develop a new generation of software infrastructure that will provide distributed access to observed and simulated data from the climate and weather communities. GO-ESSP 2011 Workshop Summary Th

Collaboration designed to develop a new generation of software infrastructure that will provide distributed access to observed and simulated data from the climate and weather communities. GO-ESSP 2011 Workshop Summary Th

Add to Reading List

Source URL: nomads.ncdc.noaa.gov

Language: English - Date: 2011-06-01 07:08:42
53Book of Proceedings www.internetidentityworkshop.com Collected & Compiled by KAS NETLER, HEIDI N SAUL AND BARBARA BYERS  Notes in this book can also be found online at

Book of Proceedings www.internetidentityworkshop.com Collected & Compiled by KAS NETLER, HEIDI N SAUL AND BARBARA BYERS Notes in this book can also be found online at

Add to Reading List

Source URL: www.internetidentityworkshop.com

Language: English - Date: 2015-05-20 16:35:11
54DATA SHEET  CA API Management The Industry’s Leading Products for Enterprise-Scale API Management At a Glance

DATA SHEET CA API Management The Industry’s Leading Products for Enterprise-Scale API Management At a Glance

Add to Reading List

Source URL: www.itworldcanada.com

Language: English - Date: 2015-05-08 11:18:23
55We operate online portals with technology that focuses on the digital identity, visibility and reputation of small and medium sized businesses measurably boosting their new customer acquisition. As one of the companies w

We operate online portals with technology that focuses on the digital identity, visibility and reputation of small and medium sized businesses measurably boosting their new customer acquisition. As one of the companies w

Add to Reading List

Source URL: www.digitaleseiten.de

Language: English - Date: 2015-04-21 03:07:18
56Mission:

Mission: "this group was formed to create "a cohesive [authentication] strategy and facilitate the use of recognized protocols. This group is "tasked with researching existing industry methods and recommending the adopt

Add to Reading List

Source URL: reso.memberclicks.net

Language: English - Date: 2013-10-14 18:00:13
57Data Dictionary  OAuth OData  Implementing

Data Dictionary OAuth OData Implementing

Add to Reading List

Source URL: reso.memberclicks.net

Language: English - Date: 2014-11-07 10:38:32
58Internet Engineering Task Force (IETF) Request for Comments: 7522 Category: Standards Track ISSN: B. Campbell

Internet Engineering Task Force (IETF) Request for Comments: 7522 Category: Standards Track ISSN: B. Campbell

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2015-05-19 19:39:04
59Project Proposal Name Steve Lacey  Student number

Project Proposal Name Steve Lacey Student number

Add to Reading List

Source URL: uwe.stevelacey.net

Language: English - Date: 2010-10-15 17:18:17
60Device Token Protocol for Persistent Authentication Shared Across Applications John Trammel, Ümit Yalçınalp, Andrei Kalfas, James Boag, Dan Brotsky Adobe Systems Incorporated, 345 Park Avenue, San Jose, USA {jtrammel,

Device Token Protocol for Persistent Authentication Shared Across Applications John Trammel, Ümit Yalçınalp, Andrei Kalfas, James Boag, Dan Brotsky Adobe Systems Incorporated, 345 Park Avenue, San Jose, USA {jtrammel,

Add to Reading List

Source URL: www.umityalcinalp.com

Language: English - Date: 2013-01-24 18:05:14