<--- Back to Details
First PageDocument Content
Cloud standards / Computer access control / OAuth / Federated identity / Cloud infrastructure / XACML / Cloud computing / User-Managed Access / Application programming interface / Web 2.0 / Spring Framework
Date: 2016-05-12 06:20:07
Cloud standards
Computer access control
OAuth
Federated identity
Cloud infrastructure
XACML
Cloud computing
User-Managed Access
Application programming interface
Web 2.0
Spring Framework

User-centered Security Management of API-based Data Integration Workflows

Add to Reading List

Source URL: demo.a-sit.at

Download Document from Source Website

File Size: 804,63 KB

Share Document on Facebook

Similar Documents

Synthesising Verified Access Control Systems in XACML Nan Zhang School of Computer Science University of Birmingham Birmingham, UK, B15 2TT

Synthesising Verified Access Control Systems in XACML Nan Zhang School of Computer Science University of Birmingham Birmingham, UK, B15 2TT

DocID: 1voGj - View Document

Synthesising Verified Access Control Systems in XACML Nan Zhang School of Computer Science University of Birmingham Birmingham, UK, B15 2TT

Synthesising Verified Access Control Systems in XACML Nan Zhang School of Computer Science University of Birmingham Birmingham, UK, B15 2TT

DocID: 1tYAK - View Document

2  SAML 2.0 profile of XACML v2.0 3

2 SAML 2.0 profile of XACML v2.0 3

DocID: 1sUul - View Document

Draft NISTIR 8112, Attribute Metadata

Draft NISTIR 8112, Attribute Metadata

DocID: 1rtQZ - View Document

Information Visualization for Rule-based Resource Access Control Jaime Montemayor, Andrew Freeman, John Gersh, Thomas Llanso, Dennis Patrone The Johns Hopkins University Applied Physics LaboratoryJohns Hopkins Roa

Information Visualization for Rule-based Resource Access Control Jaime Montemayor, Andrew Freeman, John Gersh, Thomas Llanso, Dennis Patrone The Johns Hopkins University Applied Physics LaboratoryJohns Hopkins Roa

DocID: 1rtqe - View Document