×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [local credentials]
Implementing a comprehensive application security progaram - Tawfiq
470 views
Final report
235 views
Paul Caskey Technology Architect
[email protected]
June 21, 2007 The University of Texas System Federated Identity Management Initiative
221 views
Module 5 - Create your own SWORD client
4.912 views
Advanced topic: The SRM protocol and the StoRM implementation Ezio Corso (EGRID Project, ICTP)
221 views
Integrated... Interoperable... Institutional... Implementation... Institutional VLE - Library Integration at University of Ulster
214 views
The Rise of Federations…Almost Everywhere. Topics Federation Basics Drivers Components International and pulic sector developments InCommon and its uses
217 views
Data and Reporting Workstream September, 17 2009 GAD Process: Eyeblaster Training
213 views
30-Sep-03D.P.Kelsey, SCG Summary1 Security Co-ordination Group (WP7 SCG) EDG Heidelberg 30 September 2003 David Kelsey CCLRC/RAL, UK
[email protected]
220 views
VOMS Attributes Authority & Shibboleth Authentication
32 views
SRM-2.2 Lessons Learned Markus Schulz CERN-IT-GT June 2010 DM Jamboree
220 views
OneM2M Challenges of M2M Security and Privacy. Overview M2M Abbreviation oneM2M Architecture: a quick review Security Architecture of M2M Security
236 views
Next >