Back to Results
First PageMeta Content
Computing / Computer access control / Cloud standards / Internet protocols / OAuth / Computer security / UMA / Host / Identity management / User-Managed Access


Scoped Access With UMA Eve Maler and Maciej Machulak on behalf of and with thanks to the UMA Work Group IIW 12 – May
Add to Reading List

Document Date: 2012-11-17 22:42:46


Open Document

File Size: 2,60 MB

Share Result on Facebook