×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [authorization policies]
Building an API Centric SOA
571 views
EIC 2014 Oasis Workshop: Using XACML to implement Privacy by Design
495 views
Data Entitlement with WSO2 Enterprise Middleware Platform
1.332 views
WSO2Con Asia 2014 - Building the API-Centric Enterprise
275 views
Access control patterns
625 views
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
285 views
HyTrust and VMware-Providing a Secure Virtual Infrastructure
374 views
Ecmon 0.5
110 views
May 6, 2004 1 Service agents Publish white page services description content and register the services at a yellow page site Understand ontology and answer
214 views
Doing SOA the right way Dheeraj Bhushan ACCO Brands Lincolnshire, IL
230 views
NRL Security Architecture: A Web Services-Based Solution Anya Kim Naval Research Lab Washington D.C.
[email protected]
217 views
Data Management Expert Panel - WP2. WP2 Overview
244 views
Next >