Security Assertion Markup Language

Results: 624



#Item
141Password / Access control / Identity document / Security Assertion Markup Language / Two-factor authentication / Mobile identity management / Security / Identity management / Identity

Usher 2.2 Usher Mobile Identity Platform Usher™ is a mobile identity platform designed to provide security for every business process and system access across an enterprise. It replaces traditional forms of enterpris

Add to Reading List

Source URL: www.microstrategy.com

Language: English - Date: 2014-11-18 10:40:30
142Identity / Identity management / Cloud standards / Web services / Internet protocols / OpenID / Information Card / Security Assertion Markup Language / Windows CardSpace / Federated identity / Computing / Computer security

www.interentidentityworkshop.com Book of Proceedings http://iiw.idcommons.net/Notes_iiw9 Complied by Heidi Nobantu Saul

Add to Reading List

Source URL: iiw.idcommons.net

Language: English - Date: 2009-12-10 04:45:05
143Identity management / Federated identity / Java enterprise platform / Cloud standards / Security Assertion Markup Language / SAML 2.0 / OAuth / Spring Security / OpenID / Computing / Computer security / System software

Spring Security This in-depth, 4-day course introduces the Java web developer to the Spring Security framework. We start with an overview and practical exercises in basic usage: XML configuration for authentication and

Add to Reading List

Source URL: www.batky-howell.com

Language: English - Date: 2014-03-25 11:30:36
144Identity / Federated identity / Access control / Security Assertion Markup Language / Shibboleth / SAML 2.0 / Single sign-on / Public key certificate / Authentication / Security / Identity management / Computer security

Microsoft Word - Benelogic_incommon_pop.docx

Add to Reading List

Source URL: www.benelogic.com

Language: English - Date: 2012-12-05 16:48:03
145Internet / Data / RADIUS / Computer network security / Transmission Control Protocol / Extensible Authentication Protocol / Security Assertion Markup Language / Firewall / Diameter / Computing / Internet protocols / Internet standards

Internet Engineering Task Force (IETF) Request for Comments: 7499 Category: Experimental ISSN: A. Perez-Mendez, Ed.

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2015-04-06 16:44:02
146Computing / Identity assurance / Liberty Alliance / Peer-to-peer / Security Assertion Markup Language / Cloud computing / Information Card / OpenID / Identity management / Identity / Computer security

A Field Guide to Internet Trust by Kaliya “Identity Woman” Hamlin and Steve Greenberg Summary The decreasing cost of computation and communication has made it easier than ever before to be a service provider, and has

Add to Reading List

Source URL: www.identitywoman.net

Language: English - Date: 2014-05-05 14:05:14
147System software / Digital identity / Trust law / Phorm / Security Assertion Markup Language / Law / Identity management / Computer security

Trust Framework Requirements and Guidelines V1 (DRAFT 01) Introduction In the context of digital identity systems, a trust framework is a certification program that enables a party who accepts a digital identity credenti

Add to Reading List

Source URL: openidentityexchange.org

Language: English - Date: 2014-06-06 18:30:57
148Identity management / Access control / Standards organizations / Web services / Radio-frequency identification / XACML / Security Assertion Markup Language / Authorization / PERMIS / Computing / Information / Data

International Journal of Computer Information Systems and Industrial Management Applications. ISSN[removed]Volume[removed]pp. 560–570 c MIR Labs, www.mirlabs.net/ijcisim/index.html Access Control Policies for

Add to Reading List

Source URL: web.ist.utl.pt

Language: English - Date: 2014-07-09 11:23:58
149Identity management / Internet standards / Federated identity / Internet protocols / Shibboleth / Security Assertion Markup Language / PERMIS / SAML 2.0 / SAML 1.1 / Computer security / System software / Computing

Identity Federation and Attribute-based Authorization through the Globus Toolkit, Shibboleth, GridShib, and MyProxy Tom Barton1, Jim Basney2, Tim Freeman1, Tom Scavo2, Frank Siebenlist1,3, Von Welch2, Rachana Ananthakris

Add to Reading List

Source URL: toolkit.globus.org

Language: English - Date: 2006-10-09 18:54:35
150Secure communication / Internet / Data / Internet protocols / Internet standards / Transport Layer Security / Security Assertion Markup Language / Password / SAML 2.0 / Computing / Teleconferencing / Cryptographic protocols

Zoom Security White Paper May 2013 Zoom offers the first Unified Meeting Experience (UMX), a cloud service that provides a 3-in-1 meeting platform with HD video conferencing, mobility and web meetings. UMX also offers th

Add to Reading List

Source URL: d24cgw3uvb9a9h.cloudfront.net

Language: English - Date: 2015-04-01 03:55:38
UPDATE