Identity 2.0

Results: 599



#Item
331Visual arts / Brand / Palette / Logo / Advertising / Pantone / Color / Communication design / Graphic design / Design

Brand Identity Guidelines with Brand Architecture Version 2.0 © United Way Worldwide 2009 ®

Add to Reading List

Source URL: www.ctunitedway.org

Language: English - Date: 2011-10-05 15:47:30
332Identity management / Internet standards / Federated identity / Internet protocols / Shibboleth / Security Assertion Markup Language / PERMIS / SAML 2.0 / SAML 1.1 / Computer security / System software / Computing

Microsoft Word - gridshib-pki06-final.doc

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2006-02-06 15:23:56
333System software / Security Assertion Markup Language / Federated identity / Shibboleth / XML / XACML / SAML 1.1 / SAML 2.0 / Computing / Identity management / Computer security

Transports for Trust Irving Reid Technical Architect Baltimore Technologies [removed]

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2003-04-30 15:43:02
334Access control / Computer security / Federated identity / Computer crimes / Web 2.0 / Webmail / Password notification email / Password / Login / Security

DOE 21st Century Community Learning Centers Quick Start User Guide version 2.1 UT SWORPS University of Tennessee College of Social Work Office for Research and Public

Add to Reading List

Source URL: www.tn.gov

Language: English - Date: 2014-05-28 13:27:05
335Access control / Computer security / Federated identity / Computer crimes / Web 2.0 / Webmail / Password notification email / Password / Login / Security

DOE 21st Century Community Learning Centers Quick Start User Guide version 2.1 UT SWORPS University of Tennessee College of Social Work Office for Research and Public

Add to Reading List

Source URL: www.tennessee.gov

Language: English - Date: 2014-05-28 13:27:05
336Web 2.0 / Blog hosting services / Social information processing / Facebook / Photo sharing / Internet privacy / Identity theft / Criticism of Facebook / Facebook features / World Wide Web / Software / Computing

FACEBOOK CONFIDENTIAL AND PROPRIETARY © Facebook, Inc[removed]All Rights Reserved. Facebook Law Enforcement Guidelines This guide describes the procedures law enforcement authorities should follow to request data from Fa

Add to Reading List

Source URL: info.publicintelligence.net

Language: English - Date: 2014-01-19 03:49:50
337System software / Federated identity / Security Assertion Markup Language / Shibboleth / Identity management system / SAML 2.0 / Liberty Alliance / SAML 1.1 / WS-Federation / Identity management / Identity / Computer security

Shib-SAML & InCommon-Federal eAuthentication: Ken Klingenstein Director, Internet2 Middleware and Security

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2005-04-15 13:47:06
338Identity management systems / Identity management / Security Assertion Markup Language / XACML / Authorization / Authentication / SAML 2.0 / SAML 1.1 / Computer security / System software / Security

XACML Domain Model draft-xtc-use-domain-01 7-Jun-01 This document directly references the “SAML Domain Model – draft-sstc-use-domain04” by Dave Orchard and Hal Lockhart. The definitions and descriptions contained

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2001-06-22 15:41:32
339Computing / Federated identity / Digital media / Web 2.0 / Webmail / Password / Email / Internet

Microsoft Word - instructions existing vendors.doc

Add to Reading List

Source URL: cityofknoxville.org

Language: English - Date: 2011-10-20 17:54:25
340Internet / Federated identity / Web 2.0 / Spamming / Email / Password / Computing

Website Address to use CCB’s Online Education Services: http://education.ccb.state.or.us/ Construction Contractors Board

Add to Reading List

Source URL: ccbed.ccb.state.or.us

Language: English - Date: 2014-01-07 13:29:03
UPDATE