First Page | Document Content | |
---|---|---|
![]() Date: 2014-05-01 06:38:12Computing Computer access control Computer security Cloud standards Federated identity Internet protocols Cryptographic protocols OAuth Cross-site request forgery Social login OpenID Single sign-on | Add to Reading List |