نتایج جستجو برای: thus offering solutions for identity management

تعداد نتایج: 10878504  

2005
Claudio A. Ardagna Marco Cremonini Ernesto Damiani Sabrina De Capitani di Vimercati Pierangela Samarati

Nowadays, business and recreational activities are increasingly based on the use of remote resources and e-services, and on the interaction between different, remotely located parties. In such a context, it is of paramount importance that electronic execution of private and/or sensitive transactions fully preserves information privacy, managing in a trustworthy and responsible way all identity ...

Journal: :research in applied linguistics 2010
bahar mehrabi nasser maleki

sam shepard is one of the foremost living american playwrights. he has always been concerned with the problem of identity, specifically the fragmented identity of man living in the postmodern era. such characterization is evident in his plays: true west, fool for love, and a lie of the mind. thus, the present article is to demonstrate the fragmented identity of lee and austin, eddie and may, an...

Since the victory of Islamic revolution of Iran, religion-oriented identity of Islamic revolution has been the central identity of Iranian society; however, religious identity of Islamic revolution has faced some challenges. This article is mainly concerned with these challenges, has studies and explained them and has tried to offer some solutions to strengthen the religion-oriented identity of...

Journal: :Perspectives in health information management 2009
Desla Mancilla Jackie Moczygemba

The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acu...

2003
Marit Hansen Peter Berlich

Information and Communication Technologies (ICT) expand traditional ways of social interaction and thereby feed back on the society that created them. Users have to navigate their enhanced social context and in doing so legitimately strive to apply familiar concepts such as the notion of residence or the intuitive handling of roles. We introduce the concepts of Virtual Residence and Identity Ma...

2015
Nicolas Fähnrich Michael Kubach

The automotive industry forms a complex network of original equipment manufacturers and suppliers that requires a high level of cooperation in development projects. Therefore, an efficient identity management system is needed to control access to exchanged data and collaboratively used IT-solutions supporting the development process. One of the main requirements for this system is the reliable ...

2010
Yves Denneulin Cyril Labbé Laurent d'Orazio Claudia Roncancio

Grids are widely used by CPU intensive applications requiring to access data with high level queries as well as in a file based manner. Their requirements include accessing data through metadata of different kinds, system or application ones. In addition, grids provide large storage capabilities and support cooperation between sites. However, these solutions are relevant only if they supply goo...

Journal: :IJWNBT 2014
László Bokor Zoltán Faigl Sándor Imre

This paper is committed to give an overview of the Host Identity Protocol (HIP), to introduce the basic ideas and the main paradigms behind it, and to make an exhaustive survey of mobility management schemes in the Host Identity Layer. The authors’ goal is to show how HIP emerges from the list of potential alternatives with its wild range of possible usability, complex feature set and power to ...

2010
Abdullatif Shikfa Melek Önen Refik Molva

Key management in opportunistic networks is a challenging problem that cannot be solved with existing solutions. In this paper, we analyze the requirements of key management in the framework of opportunistic networks and content-based forwarding. We then present a specific key management scheme that enables the bootstrapping of local, topology-dependent security associations between a node and ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید