Is there a right way to build a cloud
Cd Editors Presentation 97 2003 Version 10 14 2008 Ppt
Consumerizing Industrial Access Control: Using UMA to Add Privacy and Usability to Strong Security
NEW INNOVATIONS IN CONSENT, PRIVACY, AND USER-MANAGED ACCESS
Graphical password authentication
Extending the Power of Consent with User-Managed Access & OpenUMA
Digital Consent: Taking UMA from Concept to Reality
CIS 2015 Identity Relationship Management in the Internet of Things
Presentation PBS – The first Five Years An operators Experience Darren Whyte - Kalari.
Whitebox Security Data Governance Cybersecurity, Milano 9 Aprile 2014.