منابع مشابه
Browser-Based Applications: Positive or Negative Transference?
Applications that run on top of web browsers dominate the Internet today. Given the many similarities among these applications’ features, positive transference from one to another is often seen as an important source of ease-of-use for such applications. This paper examines the many differences in the way similar features are implemented in different browserbased applications, analyzing the way...
متن کاملTransference, transference interpretations, and transference-focused psychotherapies.
The concept of transference and the use of transference interpretations in psychotherapy have been highly controversial topics garnering frequent attention both within psychoanalysis and across multiple orientations of psychotherapy. In this article, we review the empirical evidence as it bears on this controversy and discuss the implications of the evidence for psychoanalysis, psychodynamic ps...
متن کاملShibboleth: Private Mailing List Manager
We describe Shibboleth, a program to manage private Internet mailing lists. Differing from other mailing list managers, Shibboleth manages lists or groups of lists which are closed, or have membership by invitation only. So instead of focusing on automating the processes of subscribing and unsubscribing readers, we include features like SMTP forgery detection, prevention of outsiders’ ability t...
متن کاملClient-based CardSpace-Shibboleth Interoperation
Whilst the growing number of identity management systems have the potential to reduce the threat of identity attacks, major deployment problems remain because of the lack of interoperability between such systems. In this paper we propose a simple, novel scheme to provide interoperability between two of the most widely discussed identity systems, namely CardSpace and Shibboleth. In this scheme, ...
متن کاملRoaming Network Access Using Shibboleth
There are activities aiming at abling users to dock to a wireless or wired network while visiting organisations outside the premises of their usual connection to the network. These activities, known as roaming access to network, are usually based on well-known technologies, such as RADIUS, IEEE 802.1X, VPN or HTTP redirection. On the other hand, there are applications, usually on the web, that ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: American Journal of Psychotherapy
سال: 2004
ISSN: 0002-9564,2575-6559
DOI: 10.1176/appi.psychotherapy.2004.58.1.133