نتایج جستجو برای: thus offering solutions for identity management
تعداد نتایج: 10878504 فیلتر نتایج به سال:
The present study aimed to predict suicide ideation based on identity styles and coping strategies in adolescents. The study population included all adolescents studying in Tabriz high schools. A total of 120 boys and girls were selected and completed the Beck Scale for Suicidal Ideation (BSSI), the Coping Strategies Inventory (CISS), and the Identity Style Inventory (ISI-6). Results showed tha...
In wireless era, digital users in electronic world (e-world) are represented by a set of data called Digital Identity (ID), which they use, among other functions, for authentication purposes. Within the e-world it is risky to lose the identity and so security solutions are required to protect IDs. Information security should provide the necessary identity management (IDM) process to mitigate th...
Key management for anonymous communication in mobile ad hoc networks is a critical but unsolved problem. Many current anonymous mobile ad hoc routing protocols assume that mobile users share pairwise secrets before they start an anonymous communication session. This assumption is impractical for many ad hoc scenarios where pairwise shared keys are difficult to be set up in advance. Public-key b...
1.0 overview it seems that grammar plays a crucial role in the area of second and foreign language learning and widely has been acknowledged in grammar research. in other words, teaching grammar is an issue which has attracted much attention to itself, and a lot of teachers argue about the existence of grammar in language teaching and learning. this issue will remind us a famous sentence f...
We develop solutions for the security and privacy of user identity information in a federation. By federation we mean a group of organizations or service providers which have built trust among each other and enable sharing of user identity information amongst themselves. We first propose a flexible approach to establish a single sign-on (SSO) ID in the federation. Then we show how a user can le...
This paper will present solutions to interconnect small wireless cells via a networking infrastructure, transparently grouping several cells together into a larger administrative unit of the dimensions of a common LAN. The main focus will be put on the design of different solutions offering different qualities of functionality depending on the application scenario. The designs will be presented...
Background: Drugs play a strategic role as a health commodity. Thus, the supply chain management of drugs is an important issue to reducing costs and thereby improving patient health. Objective: This study evaluated the status of drug supply chain management and health reform in the pharmaceutical sector of teaching hospitals in Ahvaz, Iran. <strong...
Sam Shepard is one of the foremost living American Playwrights. He has always been concerned with the problem of identity, specifically the fragmented identity of man living in the postmodern era. Such characterization is evident in his plays: True West, Fool for Love, and A Lie of the Mind. Thus, the present article is to demonstrate the fragmented identity of Lee and Austin, Eddie and May, an...
It is common practice for enterprises and other organisations to ask people to disclose their personal data in order to grant them access to services and engage in transactions. This practice is not going to disappear, at least in the foreseeable future. Most enterprises need personal information to run their businesses and provide the required services, many of whom have turned to identity man...
Organizations in both public and private sectors are realizing the value of identity and access management technology to address mission-critical needs and to ensure appropriate access to resources across heterogeneous technology environments, and to meet rigorous compliance requirements. A well-designed identity management system is fundamental to enabling better information sharing, enhancing...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید