Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Oauth-Teragrid'
Oauth-Teragrid published presentations and documents on DocSlides.
An OAuth Service for Issuing Certificates
by briana-ranney
to Science Gateways for TeraGrid . Users. Jim Bas...
TeraGrid Science Gateways
by lois-ondreau
in Barcelona. Nancy Wilkins-Diehr. TeraGrid Area ...
OAuth Roadmap Hannes Tschofenig, Derek Atkins
by alexa-scheidler
Good Progress with Our Documents. Specifications....
OAuth Security for Gateways
by myesha-ticknor
Zhenhua. . (Gerald) . Guo. and Marlon Pierce. I...
OAuth Security for Gateways
by mitsue-stanley
Zhenhua. . (Gerald) . Guo. and Marlon Pierce. I...
TeraGrid Science Gateways
by mitsue-stanley
Nancy Wilkins-Diehr. TeraGrid Area Director for S...
Federated
by celsa-spraggs
Incident . Response. Jim Basney. jbasney@illinois...
InCommon
by calandra-battersby
and . TeraGrid. Campus Champions. Jim Basney. j...
TeraGrid Science Gateways
by kittie-lecroy
Nancy Wilkins-Diehr. TeraGrid Area Director for S...
Eat-out, put-together or
by tabitha
cook. Web . standards for . IoT. . Security. Bhuv...
WeinaMauoitca
by claire
OAuth 20WeinaMaAgendaOAuth overviewSimple exampleO...
스프링 시큐리티와
by backbays
. OAuth. 2010.12.4. 고종. 봉. 발표 개요. ...
IETF OAuth Proof-of-Possession
by natalia-silvester
Hannes Tschofenig. Status. Finished various speci...
David Millard
by tatiana-dople
dem@ecs.soton.ac.uk. The web 2.0 development surv...
Securing Rich Client Applications Using OAuth 2.0 and Windo
by lindy-dunigan
Caleb Baker. Senior Program Manager. WAD-B307. Ag...
IETF 90 OAuth WG
by lois-ondreau
OAuth Symmetric Proof of . Possession . for Code ...
A SASL and GSS-API Mechanism for
by trish-goza
OAuth. draft-ietf-kitten-sasl-oauth-00. . Willia...
Overview of Cyberinfrastructure and the Breadth of Its Application
by rayfantasy
South Carolina . State University. Cyberinfrastruc...
Clouds and FutureGrid
by luanne-stotts
MSI-CIEC All Hands Meeting. SDSC January 27 2010....
Science Gateway Advanced Support Activities in PTI
by debby-jeon
Marlon Pierce. Indiana University. Staff Member. ...
Overview of Cyberinfrastructure and the Breadth of Its Appl
by lois-ondreau
South Carolina . State University. Cyberinfrastru...
OGCE Overview: Portals, Services, Workflows, Gadgets, and T
by danika-pritchard
Marlon Pierce (IU), Suresh . Marru. (IU), . Rami...
TeraGrid Science Gateway AAAA Model:
by lindy-dunigan
Implementation and Lessons Learned. Jim Basney. N...
Science Gateway Advanced Support Activities in PTI
by phoebe-click
Marlon Pierce. Indiana University. Staff Member. ...
OGCE Overview: Portals, Services, Workflows, Gadgets, and T
by myesha-ticknor
Marlon Pierce (IU), Suresh . Marru. (IU), . Rami...
Overview of Cyberinfrastructure and the Breadth of Its
by jane-oiler
Application. Howard University. Cyberinfrastructu...
A History of the
by giovanna-bartolotta
TeraGrid. Science Gateway Program:. A Personal V...
IETF OAuth WG Virtual Interims (2024/5) Area
by stefany-barnette
IETF OAuth WG Virtual Interims (2024/5) Area Direc...
Introduction to OpenID Connect
by quentin
October 29, 2024. Michael B. Jones. Self-Issued Co...
Twitter Application Programming Interface(API)
by isabella
by. Nayana Mahajan. Data. . Collection. 1. Table...
(DOWNLOAD)-Getting Started with OAuth 2.0: Programming Clients for Secure Web API Authorization and Authentication
by kirostreasure_book
The Benefits of Reading Books,Most people read to ...
(DOWNLOAD)-Getting Started with OAuth 2.0: Programming Clients for Secure Web API Authorization and Authentication
by kirostreasure_book
The Benefits of Reading Books,Most people read to ...
[FREE]-Keycloak - Identity and Access Management for Modern Applications: Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 protocols to secure applications
by herberttyriek
The Desired Brand Effect Stand Out in a Saturated ...
Managing your Globus Deployment
by layla
Oak Ridge National Lab. Rachana (. rachana@globus....
Federated Identity Management IG
by maxasp
FIM4R CLARIN pilot – . progress report. Menzo Wi...
Matthew Van Gundy Technical Leader, Cisco Advanced Security Initiatives Group (ASIG)
by pressio
Cisco Offensive Summit 2018. Finding and exploitin...
Named Entity Recognition in Tweets: TwitterNLP Ludymila Lobo
by ellena-manuel
Named Entity Recognition in Tweets: TwitterNLP Lu...
Andrew Salamatov Senior Program Manager
by tawny-fly
#3-574. Apps for Outlook Power Hour. Mail Apps ...
Distributed Web Security for
by sherrill-nordquist
Science Gateways. Jim Basney. jbasney@illinois.ed...
Integrating Exchange 2013 with Lync and SharePoint
by phoebe-click
Bhargav Shukla. OFC-B271. Agenda. Integration Arc...
Load More...