نتایج جستجو برای: thus offering solutions for identity management
تعداد نتایج: 10878504 فیلتر نتایج به سال:
Nowadays, business and recreational activities are increasingly based on the use of remote resources and e-services, and on the interaction between different, remotely located parties. In such a context, it is of paramount importance that electronic execution of private and/or sensitive transactions fully preserves information privacy, managing in a trustworthy and responsible way all identity ...
sam shepard is one of the foremost living american playwrights. he has always been concerned with the problem of identity, specifically the fragmented identity of man living in the postmodern era. such characterization is evident in his plays: true west, fool for love, and a lie of the mind. thus, the present article is to demonstrate the fragmented identity of lee and austin, eddie and may, an...
Since the victory of Islamic revolution of Iran, religion-oriented identity of Islamic revolution has been the central identity of Iranian society; however, religious identity of Islamic revolution has faced some challenges. This article is mainly concerned with these challenges, has studies and explained them and has tried to offer some solutions to strengthen the religion-oriented identity of...
The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acu...
Information and Communication Technologies (ICT) expand traditional ways of social interaction and thereby feed back on the society that created them. Users have to navigate their enhanced social context and in doing so legitimately strive to apply familiar concepts such as the notion of residence or the intuitive handling of roles. We introduce the concepts of Virtual Residence and Identity Ma...
The automotive industry forms a complex network of original equipment manufacturers and suppliers that requires a high level of cooperation in development projects. Therefore, an efficient identity management system is needed to control access to exchanged data and collaboratively used IT-solutions supporting the development process. One of the main requirements for this system is the reliable ...
Grids are widely used by CPU intensive applications requiring to access data with high level queries as well as in a file based manner. Their requirements include accessing data through metadata of different kinds, system or application ones. In addition, grids provide large storage capabilities and support cooperation between sites. However, these solutions are relevant only if they supply goo...
This paper is committed to give an overview of the Host Identity Protocol (HIP), to introduce the basic ideas and the main paradigms behind it, and to make an exhaustive survey of mobility management schemes in the Host Identity Layer. The authors’ goal is to show how HIP emerges from the list of potential alternatives with its wild range of possible usability, complex feature set and power to ...
Key management in opportunistic networks is a challenging problem that cannot be solved with existing solutions. In this paper, we analyze the requirements of key management in the framework of opportunistic networks and content-based forwarding. We then present a specific key management scheme that enables the bootstrapping of local, topology-dependent security associations between a node and ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید