Massachusetts Institute of Technology
Sign in | Create Account

Session II: Cybersecurity Through an Identity Management System

Elli Androulaki, Maritza Johnson, Binh Vo, Steven Bellovin (Columbia). 10/12/2009

Comments (0)

It looks like no one has posted a comment yet. You can be the first!

You need to log in, in order to post comments. If you don’t have an account yet, sign up now!

Engaging Data Forum

Engaging Data Forum

Category: Events | Updated almost 5 years ago

Created
November 23, 2009 12:25
Category
Tags
License
All Rights Reserved (What is this?)
Additional Files


Viewed
12716 times

More from Engaging Data Forum

Keynote II

Keynote II

Added almost 5 years ago | 00:33:03 | 7595 views

Session IV: Panel

Session IV: Panel

Added almost 5 years ago | 00:14:21 | 10765 views

Panel 2: Ensuring Data Protection: Legal and Regulatory Methods

Panel 2: Ensuring Data Protection: ...

Added almost 5 years ago | 01:26:00 | 15167 views

Keynote III

Keynote III

Added almost 5 years ago | 00:39:27 | 7401 views

Session III: Navigation of Cascading Data Errors

Session III: Navigation of Cascadin...

Added almost 5 years ago | 00:14:16 | 19682 views

Session I: Designing for Doubt: Citizen Science and the Challenge of Change

Session I: Designing for Doubt: Cit...

Added almost 5 years ago | 00:14:40 | 8497 views