OAuth

Results: 220



#Item
81RESTful SecurityW2SP Dan Forsberg Nokia Research Center & Helsinki University of Technology (HUT)

RESTful SecurityW2SP Dan Forsberg Nokia Research Center & Helsinki University of Technology (HUT)

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:05
82Rolando Navarrete Full Stack Web Developer Los Angeles, CA | ( |  | @digital_mafioso| Portfolio Objective A passionately curious developer looking to join a highly collaborative

Rolando Navarrete Full Stack Web Developer Los Angeles, CA | ( | | @digital_mafioso| Portfolio Objective A passionately curious developer looking to join a highly collaborative

Add to Reading List

Source URL: turing-people-production.s3.amazonaws.com

Language: English - Date: 2015-02-02 19:39:44
83TECH 3366 THE CROSS PLATFORM AUTHENTICATION PROTOCOL VERSION 1.0

TECH 3366 THE CROSS PLATFORM AUTHENTICATION PROTOCOL VERSION 1.0

Add to Reading List

Source URL: tech.ebu.ch

Language: English - Date: 2014-10-17 00:18:29
84ESGF	
  –	
  IdEA:	
    Iden-ty,	
  En-tlement	
  and	
  Access	
  Management	
   ESGF	
  UV-­‐CDAT	
  Conference	
    09-­‐11	
  December	
  2014	
  

ESGF  –  IdEA:   Iden-ty,  En-tlement  and  Access  Management   ESGF  UV-­‐CDAT  Conference   09-­‐11  December  2014  

Add to Reading List

Source URL: aims-group.github.io

Language: English - Date: 2015-02-05 11:37:23
85Building a Connected Web Observatory Architecture and Challenges Thanassis Tiropanis1 , Xing Wang1 , Ramine Tinati1 , and Wendy Hall1 University of Southampton  Abstract. An increasing number of datasets and analytics re

Building a Connected Web Observatory Architecture and Challenges Thanassis Tiropanis1 , Xing Wang1 , Ramine Tinati1 , and Wendy Hall1 University of Southampton Abstract. An increasing number of datasets and analytics re

Add to Reading List

Source URL: eprints.soton.ac.uk

Language: English - Date: 2014-06-23 16:13:49
86Privacy Postures of Authentication Technologies Francisco Corella, PhD  Karen Lewison, MD

Privacy Postures of Authentication Technologies Francisco Corella, PhD Karen Lewison, MD

Add to Reading List

Source URL: pomcor.com

Language: English - Date: 2013-07-14 20:31:33
87User-Managed Access (UMA) in the ACE Context Eve Maler, chair @UMAWG | @xmlgrrl 13 January 2015 tinyurl.com/umawg

User-Managed Access (UMA) in the ACE Context Eve Maler, chair @UMAWG | @xmlgrrl 13 January 2015 tinyurl.com/umawg

Add to Reading List

Source URL: tschofenig.priv.at

Language: English - Date: 2015-01-14 04:10:54
88Zachary C. Routhier 1424 Pearl St. Denver, CO  • (Objective As a Jr. RoR developer with a background in aeronautical science and teaching, I enjoy the thrill of solving technical

Zachary C. Routhier 1424 Pearl St. Denver, CO • (Objective As a Jr. RoR developer with a background in aeronautical science and teaching, I enjoy the thrill of solving technical

Add to Reading List

Source URL: turing-people-production.s3.amazonaws.com

Language: English - Date: 2015-02-13 13:48:44
89index Numerics 1D barcodes alphanumeric text 16 Code–12 Code 39/Code 39 mod 43 10

index Numerics 1D barcodes alphanumeric text 16 Code–12 Code 39/Code 39 mod 43 10

Add to Reading List

Source URL: www.manning.com

Language: English - Date: 2015-01-21 15:51:24
90Kavita Sachdeva 919 2nd  Ave W #303, Seattle, WA  98119     (608) 620­3382 

Kavita Sachdeva 919 2nd  Ave W #303, Seattle, WA  98119     (608) 620­3382 

Add to Reading List

Source URL: turing-people-production.s3.amazonaws.com

Language: English - Date: 2015-01-12 14:59:58