Introduction to threat_modeling
Wso2con identity patterns
OAuth 2.0 Integration Patterns with XACML
Security in the Cloud
Fine-grained authorization with XACML
Securing RESTful Services
WSO2 @ UoP Job fair
Stonehenge
Secured SOA
The Lanka Gate Initiative
Evolution of Internet Identity
Securing Insecure
The Evolution of Internet Identity
Connected Identity : Benefits, Risks & Challenges
Next-Gen Apps with IoT and Cloud
Connected Identity : The Role of the Identity Bus
Best Practices in Building an API Security Ecosystem
API Security : Patterns and Practices
Open Source for Cyber Security