<--- Back to Details
First PageDocument Content
Computer security / Software / OAuth / Identity management / Identity management systems / OpenID / Play Framework / Distributed social network / Computing / Cloud standards / Federated identity
Date: 2015-03-21 15:09:12
Computer security
Software
OAuth
Identity management
Identity management systems
OpenID
Play Framework
Distributed social network
Computing
Cloud standards
Federated identity

Venn technology decision tree   The HEART WG is mainly about profiling three technologies: OAuth, OpenID Connect, and  UMA. OAuth is a “base” technology. OpenID Connect is built on top of O

Add to Reading List

Source URL: openid.net

Download Document from Source Website

File Size: 184,82 KB

Share Document on Facebook

Similar Documents

Social Network Aggregation Using Face-Recognition Patrick Minder and Abraham Bernstein University of Zurich, Dynamic and Distributed Informations Systems Group {minder,bernstein}@ifi.uzh.ch

DocID: 1uMiX - View Document

Hermes: Dynamic Partitioning for Distributed Social Network Graph Databases Daniel Nicoara Shahin Kamali

DocID: 1t3cD - View Document

Computing / Economy / Network architecture / Economic systems / Net neutrality / Peering / Peer-to-peer / Social peer-to-peer processes / Border Gateway Protocol / Barter / Internet / Shared resource

Bootstrapping a Distributed Computational Economy with Peer-to-Peer Bartering Brent Chun Intel Research Berkeley

DocID: 1r8YZ - View Document

Computing / Distributed data storage / Concurrent computing / File sharing / Network architecture / Peer-to-peer / Distributed hash table / Gossip protocol / Social peer-to-peer processes / Tapestry / Chord / Scalability

Aggregating Information in Peer-to-Peer Systems for Improved Join and Leave∗ Keno Albrecht, Ruedi Arnold, Michael G¨ahwiler, Roger Wattenhofer Swiss Federal Institute of Technology Department of Computer Science 8092

DocID: 1qD3a - View Document

Computing / File sharing / Concurrent computing / Distributed computing / Network architecture / Peer-to-peer / Telecommunications engineering / Distributed hash table / Social peer-to-peer processes / Overlay network / Computer network / Mesh networking

itDecentralized Communication against Surveillance and Privacy Violation Kalman Graffi

DocID: 1q9zm - View Document