Web Access Management

Results: 611



#Item
51Rebranding	the	Web	of	Trust A	White	Paper	from	Rebooting	the	Web	of	Trust	 by	Shannon	Appelcline,	Dave	Crocker,	Randall	Farmer,	and	Justin	Newton

Rebranding the Web of Trust A White Paper from Rebooting the Web of Trust by Shannon Appelcline, Dave Crocker, Randall Farmer, and Justin Newton

Add to Reading List

Source URL: www.weboftrust.info

Language: English - Date: 2016-06-08 16:57:37
52User-centered Security Management of API-based Data Integration Workflows

User-centered Security Management of API-based Data Integration Workflows

Add to Reading List

Source URL: demo.a-sit.at

Language: English - Date: 2016-05-12 06:20:07
53Informative Note (Art. 13 of Legislative Decree no. 196 of 30 JuneThis informative note is provided for users who interact with the web services of BONNE NOUVELLE S.r.l., with registered office and headquarters in

Informative Note (Art. 13 of Legislative Decree no. 196 of 30 JuneThis informative note is provided for users who interact with the web services of BONNE NOUVELLE S.r.l., with registered office and headquarters in

Add to Reading List

Source URL: www.jkplace.com

Language: English - Date: 2015-10-14 10:58:09
54Opportunities	Created	by the	Web	of	Trust	for	Controlling						 and	Leveraging	Personal	Data	 A	White	Paper	from	Rebooting	the	Web	of	Trust

Opportunities Created by the Web of Trust for Controlling and Leveraging Personal Data A White Paper from Rebooting the Web of Trust

Add to Reading List

Source URL: www.weboftrust.info

Language: English - Date: 2016-06-08 16:57:37
55SERVICE and API EMULATION  CloudPort is an easy-to-configure, comprehensive service emulation product for mimicking service APIs as a virtual endpoint or ESB broker that can be communicated  Easy to Deploy

SERVICE and API EMULATION CloudPort is an easy-to-configure, comprehensive service emulation product for mimicking service APIs as a virtual endpoint or ESB broker that can be communicated Easy to Deploy

Add to Reading List

Source URL: www.crosschecknet.com

Language: English - Date: 2012-10-09 22:39:20
56

PDF Document

Add to Reading List

Source URL: files.dsalo.info

Language: English - Date: 2013-08-09 10:08:56
57Why Have A Privacy Policy? This page will describe management of our web site as regards processing the personal data of users who visit us. This information is provided - also in pursuance of Section 13 of Legislative D

Why Have A Privacy Policy? This page will describe management of our web site as regards processing the personal data of users who visit us. This information is provided - also in pursuance of Section 13 of Legislative D

Add to Reading List

Source URL: www.sintechnology.com

Language: English - Date: 2015-07-06 03:17:20
58R2R+BCO-DMO – Linked Oceanographic Datasets Adila Krisnadhi1,2 , Robert Arko3 , Suzanne Carbotte3 , Cynthia Chandler4 , Michelle Cheatham1 , Pascal Hitzler1 , Yingjie Hu5 , Krzysztof Janowicz5 , Peng Ji3 , Nazifa Karim

R2R+BCO-DMO – Linked Oceanographic Datasets Adila Krisnadhi1,2 , Robert Arko3 , Suzanne Carbotte3 , Cynthia Chandler4 , Michelle Cheatham1 , Pascal Hitzler1 , Yingjie Hu5 , Krzysztof Janowicz5 , Peng Ji3 , Nazifa Karim

Add to Reading List

Source URL: geog.ucsb.edu

Language: English - Date: 2015-09-24 20:23:22
59The quest to replace passwords: a framework for comparative evaluation of Web authentication schemes

The quest to replace passwords: a framework for comparative evaluation of Web authentication schemes

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2012-03-08 04:47:23
60External and Federated Identities on the Web Jan Pazdziora Sr. Principal Software Engineer Identity Management Special Projects, Red Hat

External and Federated Identities on the Web Jan Pazdziora Sr. Principal Software Engineer Identity Management Special Projects, Red Hat

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2015-10-01 06:36:17