Commons of Identity: Sherpa Identity Management

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Identity Management

Our daily activities increasingly rely on remote resources and services — specifically, on interactions between different, remotely located parties. Because these parties might (and sometimes should) know little about each other, digital identities — electronic representations of individuals’ or organizations’ sensitive information — help introduce them to each other and control the amount of i...

متن کامل

woman-defined identity: analysis of selected poems of adrienne rich

the current thesis is composed in five chapters in the following fashion: chapter two encompasses the applied framework of the project in details; the methodology of carl gustav jung to explain the process of individuation, the major archetypes and their attributes and his techniques to assess the mind’s strata are all explained. moreover, the austrian psychoanalysts, heinz kohut’s models of a...

Identity-Enriched Session Management

The Internet has become an important part in every day life for many users. It has changed from an instrument to exchange and link scientific data to an economical and social place, where people spend their working and spare time. But the underlying technology has not adapted to the newly risen demands of communication and collaboration. The user is almost isolated and anonymous when using the ...

متن کامل

Identity Management - Best Practice

Zusammenfassung: Mit dem als Informationsmanagement und Identity Management fungierenden System TUGonline steht der Technischen Universität Graz seit Längerem ein mächtiges Werkzeug zur Verfügung, an das bis dato alle bedienstetenund studienrelevanten Systeme angebunden worden sind. Mittlerweile wird TUGonline mit der Produktbezeichnung CAMPUSonline an mehreren Universitäten in Österreich produ...

متن کامل

Non-Intrusive Identity Management

This paper presents a novel architecture for digital identity management. The proposed architecture is highly secure and scales seamlessly across organizational boundaries, while at the same time protecting the privacy interests of individuals and organizations. To achieve these properties, the architecture heavily relies on Digital Credentials, a cryptographic authentication technology specifi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Dhaulagiri Journal of Sociology and Anthropology

سال: 1970

ISSN: 1994-2672,1994-2664

DOI: 10.3126/dsaj.v1i0.288