User-Managed Access

Results: 12



#Item
1Identity management / Computer access control / Identity / Privacy / Computing / Digital rights / Human rights / Law / Kantara Initiative / Internet privacy / Internet Governance Forum / User-Managed Access

ITAC SPEAKING NOTES FOR THE OCED PRIVACY CONFERENCE IN ISRAELOCTOBER 2010 PANEL IV – FOSTERING INNOVATION IN PRIVACY PROTECTION “This session will examine some innovative approaches being taken by organisation

Add to Reading List

Source URL: www.internetac.org

Language: English - Date: 2014-04-23 18:14:13
2Computing / Computer access control / Computer security / Identity management systems / Identity management / Federated identity / ForgeRock / Cloud standards / Computer network security / User-Managed Access / Customer engagement / Provisioning

Why Financial Services Choose ForgeRock What We Do IMPROVE CUSTOMER EXPERIENCE

Add to Reading List

Source URL: www.forgerock.com

Language: English - Date: 2016-08-11 01:02:02
3Computing / Computer access control / Computer security / Cloud standards / Federated identity / Identity management / User-Managed Access / OAuth / OpenAM / Cloud computing / Authorization / Internet privacy

USER-MANAGED ACCESS DATASHEET ForgeRock Identity Platform: User-Managed Access User-controlled data sharing for privacy and trust

Add to Reading List

Source URL: www.forgerock.com

Language: English - Date: 2016-01-27 00:48:20
4Computing / Computer access control / Computer security / Cloud standards / Identity management / Identity management systems / Federated identity / OAuth / User-Managed Access / XACML / OpenID Connect / OpenID

Securing Integration of Cloud Services in Cross-Domain Distributed Environments Bojan Suzic Institute for Applied Information Processing and Communications Graz, Austria

Add to Reading List

Source URL: demo.a-sit.at

Language: English - Date: 2016-04-19 05:19:12
5Computer access control / Computing / Computer security / Cloud standards / Federated identity / OpenID / Identity management / OAuth / FIDO Alliance / Authentication / SAML-based products and services / User-Managed Access

1) Working Group Name Enhanced Authentication Profile (EAP) for OpenID Connect 2) Purpose The purpose of this working group is to develop a security and privacy profile of the OpenID Connect specifications that enable us

Add to Reading List

Source URL: openid.net

Language: English - Date: 2016-03-06 14:14:42
6Cloud standards / Computer access control / OAuth / Federated identity / Cloud infrastructure / XACML / Cloud computing / User-Managed Access / Application programming interface / Web 2.0 / Spring Framework

User-centered Security Management of API-based Data Integration Workflows

Add to Reading List

Source URL: demo.a-sit.at

Language: English - Date: 2016-05-12 06:20:07
7Computing / Computer access control / Cloud standards / Internet protocols / OAuth / Computer security / UMA / Host / Identity management / User-Managed Access

Scoped Access With UMA Eve Maler and Maciej Machulak on behalf of and with thanks to the UMA Work Group IIW 12 – May

Add to Reading List

Source URL: www.xmlgrrl.com

Language: English - Date: 2012-11-17 22:42:46
8

Making the World Safe for User-Managed Access Eve Maler PayPal Identity Services Cloud Identity Summit 21 July 2010

Add to Reading List

Source URL: xmlgrrl.com

Language: English - Date: 2012-11-17 22:42:45
    9Computer access control / Computing / Computer security / OAuth / Authorization / HTTP cookie / Session / Web application / One-time authorization code / User-Managed Access

    Authorization and Bulk Transfer in Green Button Connect My Data:19:22 PM Table of Contents Table of Contents ii Table of Figures iii

    Add to Reading List

    Source URL: osgug.ucaiug.org

    Language: English - Date: 2015-07-27 21:23:51
    10

    WHITEPAPER Achieving Scalable Access Control and Privacy Protection With User-Managed Access

    Add to Reading List

    Source URL: www.forgerock.com

    Language: English
      UPDATE