Commons of Identity: Sherpa Identity Management
نویسندگان
چکیده
منابع مشابه
Identity Management
Our daily activities increasingly rely on remote resources and services — specifically, on interactions between different, remotely located parties. Because these parties might (and sometimes should) know little about each other, digital identities — electronic representations of individuals’ or organizations’ sensitive information — help introduce them to each other and control the amount of i...
متن کاملwoman-defined identity: analysis of selected poems of adrienne rich
the current thesis is composed in five chapters in the following fashion: chapter two encompasses the applied framework of the project in details; the methodology of carl gustav jung to explain the process of individuation, the major archetypes and their attributes and his techniques to assess the mind’s strata are all explained. moreover, the austrian psychoanalysts, heinz kohut’s models of a...
Identity-Enriched Session Management
The Internet has become an important part in every day life for many users. It has changed from an instrument to exchange and link scientific data to an economical and social place, where people spend their working and spare time. But the underlying technology has not adapted to the newly risen demands of communication and collaboration. The user is almost isolated and anonymous when using the ...
متن کاملIdentity Management - Best Practice
Zusammenfassung: Mit dem als Informationsmanagement und Identity Management fungierenden System TUGonline steht der Technischen Universität Graz seit Längerem ein mächtiges Werkzeug zur Verfügung, an das bis dato alle bedienstetenund studienrelevanten Systeme angebunden worden sind. Mittlerweile wird TUGonline mit der Produktbezeichnung CAMPUSonline an mehreren Universitäten in Österreich produ...
متن کاملNon-Intrusive Identity Management
This paper presents a novel architecture for digital identity management. The proposed architecture is highly secure and scales seamlessly across organizational boundaries, while at the same time protecting the privacy interests of individuals and organizations. To achieve these properties, the architecture heavily relies on Digital Credentials, a cryptographic authentication technology specifi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Dhaulagiri Journal of Sociology and Anthropology
سال: 1970
ISSN: 1994-2672,1994-2664
DOI: 10.3126/dsaj.v1i0.288