Security Identifier

Results: 389



#Item
221Identity management / Role-based access control / PERMIS / Filesystem permissions / Role hierarchy / Resource Access Control Facility / Information security / Group / User identifier / Security / Computer security / Access control

Advanced Features for Enterprise-Wide Role-Based Access Control Axel Kern Systor Security Solutions GmbH Hermann-Heinrich-Gossen-Str[removed]K¨oln, Germany [removed]

Add to Reading List

Source URL: www.acsac.org

Language: English - Date: 2002-12-09 11:36:37
222Identity management / Identity management systems / Computer security / Extensible Resource Identifier / XRDS / XML / Computing / OASIS

OASIS Specification Template

Add to Reading List

Source URL: docs.oasis-open.org

Language: English - Date: 2008-07-24 16:19:20
223Resource fork / Uniform resource identifier / Information / Security / Science / Library science / Universal identifiers / International Standard Serial Number

6JSC /ALA/7/BL Response 4 October 2012 page 1 of 2 TO: Joint Steering Committee for Development of RDA

Add to Reading List

Source URL: www.rda-jsc.org

Language: English - Date: 2012-10-09 18:45:29
224Security / Government / Systemic risk / Legal Entity Identification for Financial Contracts / Federal Security Service

Principles to be observed by Pre-LOUs that wish to integrate into the Interim Global Legal Entity Identifier System (GLEIS)

Add to Reading List

Source URL: www.leiroc.org

Language: English - Date: 2013-07-27 06:55:00
225Uniform resource identifier / Security / Government / Passports / Machine-readable passport / National security

International Civil Aviation Organization TAG/MRTD/22-WP[removed]English Only

Add to Reading List

Source URL: www.icao.int

Language: English - Date: 2014-04-23 12:46:34
226Identity management / Social issues / Security / Internet privacy / Privacy / Government / Privacy Office of the U.S. Department of Homeland Security / Personal identifier / Personal life / Ethics / Personally identifiable information

PRIVACY PRINCIPLES West Virginia Executive Branch Privacy Program Principles The West Virginia Executive Branch Privacy Program balances the individual’s right of privacy against another’s need and right of access to

Add to Reading List

Source URL: www.privacy.wv.gov

Language: English - Date: 2012-08-07 10:37:48
227System software / Security Assertion Markup Language / Liberty Alliance / XML / Uniform resource identifier / Identity provider / SAML 2.0 / SAML 1.1 / Computing / Identity management / Identity

PDF Document

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2002-07-14 13:09:26
228Identity / Security Assertion Markup Language / Liberty Alliance / XML namespace / XML / Uniform resource identifier / SOAP / SAML 2.0 / SAML 1.1 / Computing / System software / Identity management

1 2 Liberty Bindings and Profiles Specification

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2002-11-18 19:29:06
229Security / Government / Health Insurance Portability and Accountability Act / Social Security number / Biometrics / Identifier / Serial number / Medical record / De-identification / Data privacy / Protected health information / Information

Microsoft Word - Document in Microsoft Internet Explorer

Add to Reading List

Source URL: www.southalabama.edu

Language: English - Date: 2008-11-12 11:14:12
230XML / Service Provisioning Markup Language / Provisioning / Security Assertion Markup Language / OASIS / Uniform resource identifier / Directory Services Markup Language / Computing / Identity management / Web standards

1 3 Service Provisioning Markup Language (SPML) Version 1.0

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2005-01-06 16:52:19
UPDATE