×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [authorization policies]
Building an API Centric SOA
571 views
EIC 2014 Oasis Workshop: Using XACML to implement Privacy by Design
496 views
Data Entitlement with WSO2 Enterprise Middleware Platform
1.332 views
WSO2Con Asia 2014 - Building the API-Centric Enterprise
276 views
Access control patterns
625 views
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
286 views
HyTrust and VMware-Providing a Secure Virtual Infrastructure
374 views
Ecmon 0.5
111 views
May 6, 2004 1 Service agents Publish white page services description content and register the services at a yellow page site Understand ontology and answer
215 views
Doing SOA the right way Dheeraj Bhushan ACCO Brands Lincolnshire, IL
231 views
NRL Security Architecture: A Web Services-Based Solution Anya Kim Naval Research Lab Washington D.C.
[email protected]
217 views
Data Management Expert Panel - WP2. WP2 Overview
244 views
Next >