×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [user proxy]
Load Balancer MDB HTTP Proxy IIS Client Access RPC CA Mailbox IIS RPS OWA, EAS, EWS, ECP, OAB POP, IMAP SMTPUM POP IMAP Transpo rt UM SMTP POP,
229 views
Addison-Wesley User Stories Applied, For Agile Software Development (2004)
40 views
The VOMS Attribute Authority and its relation with Shibboleth Presenter: Vincenzo Ciaschini 8 th TF-EMC2 Meeting Firenze, March 2007
221 views
Deployment issues and SC3 Jeremy Coles GridPP Tier-2 Board and Deployment Board Glasgow, 1 st June 2005
217 views
Identity-Based Cryptography for Grid Security Hoon Wei Lim Information Security Group Royal Holloway, University of London (Joint work with Kenny Paterson)
221 views
Identity-Based Cryptography for Grid Security
40 views
XMPP Concrete Implementation Updates: 1. Why XMPP 2 »XMPP protocol provides capabilities that allows realization of the NHIN Direct. Simple – Built on
216 views
XMPP Concrete Implementation Updates:
49 views
User Stories
8 views
Group Members Suresh Giridharpuram Lakshman Krishnamurthy Manoj Maskara CS 5214 Spring 2010
24 views
Patricia Méndez Lorenzo (IT/GS) ALICE Offline Week (18th March 2009)
214 views
Deployment issues and SC3
53 views