User-Managed Access

Results: 12



#Item
1ITAC SPEAKING NOTES FOR THE OCED PRIVACY CONFERENCE IN ISRAELOCTOBER 2010 PANEL IV – FOSTERING INNOVATION IN PRIVACY PROTECTION “This session will examine some innovative approaches being taken by organisation

ITAC SPEAKING NOTES FOR THE OCED PRIVACY CONFERENCE IN ISRAELOCTOBER 2010 PANEL IV – FOSTERING INNOVATION IN PRIVACY PROTECTION “This session will examine some innovative approaches being taken by organisation

Add to Reading List

Source URL: www.internetac.org

Language: English - Date: 2014-04-23 18:14:13
2Why Financial Services Choose ForgeRock What We Do IMPROVE CUSTOMER EXPERIENCE

Why Financial Services Choose ForgeRock What We Do IMPROVE CUSTOMER EXPERIENCE

Add to Reading List

Source URL: www.forgerock.com

Language: English - Date: 2016-08-11 01:02:02
3USER-MANAGED ACCESS DATASHEET  ForgeRock Identity Platform: User-Managed Access User-controlled data sharing for privacy and trust

USER-MANAGED ACCESS DATASHEET ForgeRock Identity Platform: User-Managed Access User-controlled data sharing for privacy and trust

Add to Reading List

Source URL: www.forgerock.com

Language: English - Date: 2016-01-27 00:48:20
4Securing Integration of Cloud Services in Cross-Domain Distributed Environments Bojan Suzic Institute for Applied Information Processing and Communications Graz, Austria

Securing Integration of Cloud Services in Cross-Domain Distributed Environments Bojan Suzic Institute for Applied Information Processing and Communications Graz, Austria

Add to Reading List

Source URL: demo.a-sit.at

Language: English - Date: 2016-04-19 05:19:12
51) Working Group Name Enhanced Authentication Profile (EAP) for OpenID Connect 2) Purpose The purpose of this working group is to develop a security and privacy profile of the OpenID Connect specifications that enable us

1) Working Group Name Enhanced Authentication Profile (EAP) for OpenID Connect 2) Purpose The purpose of this working group is to develop a security and privacy profile of the OpenID Connect specifications that enable us

Add to Reading List

Source URL: openid.net

Language: English - Date: 2016-03-06 14:14:42
6User-centered Security Management of API-based Data Integration Workflows

User-centered Security Management of API-based Data Integration Workflows

Add to Reading List

Source URL: demo.a-sit.at

Language: English - Date: 2016-05-12 06:20:07
7Scoped Access With UMA Eve Maler and Maciej Machulak on behalf of and with thanks to the UMA Work Group IIW 12 – May

Scoped Access With UMA Eve Maler and Maciej Machulak on behalf of and with thanks to the UMA Work Group IIW 12 – May

Add to Reading List

Source URL: www.xmlgrrl.com

Language: English - Date: 2012-11-17 22:42:46
8Making the World Safe for User-Managed Access Eve Maler PayPal Identity Services Cloud Identity Summit 21 July 2010

Making the World Safe for User-Managed Access Eve Maler PayPal Identity Services Cloud Identity Summit 21 July 2010

Add to Reading List

Source URL: xmlgrrl.com

Language: English - Date: 2012-11-17 22:42:45
    9Computer access control / Computing / Computer security / OAuth / Authorization / HTTP cookie / Session / Web application / One-time authorization code / User-Managed Access

    Authorization and Bulk Transfer in Green Button Connect My Data:19:22 PM Table of Contents Table of Contents ii Table of Figures iii

    Add to Reading List

    Source URL: osgug.ucaiug.org

    Language: English - Date: 2015-07-27 21:23:51
    10WHITEPAPER  Achieving Scalable Access Control and Privacy Protection With User-Managed Access

    WHITEPAPER Achieving Scalable Access Control and Privacy Protection With User-Managed Access

    Add to Reading List

    Source URL: www.forgerock.com

    Language: English