Mobile identity management

Results: 229



#Item
121Computing / Trust negotiation / Credential / Access control / XACML / Security Assertion Markup Language / RADIUS / Negotiation / Authorization / Identity management / Security / Computer security

Enhancing access control for mobile devices with an agnostic trust negotiation decision engine.

Add to Reading List

Source URL: dl.ifip.org

Language: English - Date: 2014-08-10 19:38:20
122Android software / Identity management / Law / Privacy / Internet privacy / Facebook / Usability / Mobile marketing research / World Wide Web / Software / Ethics

Open Research Online The Open University’s repository of research publications and other research outputs Studying location privacy in mobile applications: ’predator vs. prey’ probes Conference Item

Add to Reading List

Source URL: oro.open.ac.uk

Language: English - Date: 2012-10-26 02:54:25
123Automatic identification and data capture / Radio-frequency identification / Wireless / Mobile device / Surveillance / Mobile identity / Telematics / Enterprise asset management / MHealth / Technology / Privacy / Mobile computers

white paper The Mobility Advantage: Improving operational efficiency and accountability in federal agencies

Add to Reading List

Source URL: www.mobileidsolutions.com

Language: English - Date: 2015-01-25 08:14:19
124Business / Embedded systems / Mobile banking / Mobile content / Mobile payment / Debit card / Automated teller machine / Mobile identity management / Payment systems / Electronic commerce / Technology

News Release Contact: Teri Charest, MoneyPass[removed]‐0372, [removed] Gavin Haycock/Anna Howard, Monitise +[removed]0362, [removed]

Add to Reading List

Source URL: www.moneypass.com

Language: English - Date: 2015-01-15 09:52:07
125Data privacy / Privacy law / Identity management / IPhone / ITunes / Information privacy / Privacy / Internet privacy / App Store / Ethics / Computing / Apple Inc.

Data protection Privacy in mobile apps Guidance for app developers

Add to Reading List

Source URL: ico.org.uk

Language: English - Date: 2014-09-16 06:05:45
126Identity management / Internet privacy / Privacy / Cloud computing / Ethics / Personal life / Personally identifiable information

Social, Local, Mobile…. but Legal?

Add to Reading List

Source URL: www.idest.pro

Language: English - Date: 2013-07-29 11:06:21
127Federated identity / Identity management / Mobile telecommunications / Social login / OpenID / Password / GSM Association / Authentication / Janrain / Technology / Security / Computing

PERSONAL DATA THE PROBLEM: THE SOLUTION: The password model is broken, with multiple login details, lengthy

Add to Reading List

Source URL: www.gsma.com

Language: English - Date: 2014-09-08 14:49:20
128Identity management / Access control / Authentication / Notary / Packaging / Multi-factor authentication / Password / Mobile payment / Anakam / Security / Computer security / Cryptography

BUILDING TRUSTED IDENTITY NETWORKS WWW.SECUREKEY.COM All around the world, people are managing dozens of increasingly complex online login IDs. And you’re probably one of these people. Trying to remember them all can

Add to Reading List

Source URL: securekey.com

Language: English - Date: 2014-04-25 01:16:57
129Computer security / Computer network security / Crime prevention / Entrust / National security / Security token / Two-factor authentication / Identity management / Mobile device management / Electronic commerce / Technology / Security

Mobile Security Solutions Securing & Leveraging the Mobile Enterprise The proliferation of mobile devices is front and center for virtually all organizations, in both employee and customer communities. Within the enterpr

Add to Reading List

Source URL: www.entrust.com

Language: English - Date: 2013-05-03 16:48:20
130Identity management / Federated identity / Cloud standards / Application programming interfaces / OAuth / API Management / Security Assertion Markup Language / OpenID / Single sign-on / Computer security / Computing / System software

Unifying Security Across Web, APIs and Mobile API Security with CA API Gateway and CA Single Sign-On Going Beyond Web for Cloud and Mobile with APIs Enterprises have traditionally exposed data and applications through in

Add to Reading List

Source URL: www.ca.com

Language: English - Date: 2014-09-25 12:41:03
UPDATE