نتایج جستجو برای: thus offering solutions for identity management

تعداد نتایج: 10878504  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی خواجه نصیرالدین طوسی - دانشکده مهندسی برق و کامپیوتر 1391

power transformers are important equipments in power systems. thus there is a large number of researches devoted of power transformers. however, there is still a demand for future investigations, especially in the field of diagnosis of transformer failures. in order to fulfill the demand, the first part reports a study case in which four main types of failures on the active part are investigate...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شاهد - دانشکده هنر 1391

now-a-days graphic design plays a major role in influencing culture, society, business, and customers, in such a way that one could look upon every individual as a potential customer. graphic designers seek to identify customers needs and find an intelligent solution for them. correct identification and understanding of those needs is the first step towards achieving ones goals. marketing knowh...

2011
Theodoros Ntouskas Dimitrios Papanikas Nineta Polemi

Although small, medium and micro enterprises (SMEs, mEs) play a decisive role in the European digital economy, they have been identified as one of the weakest links in information security. Identifying these security weaknesses and needs we parameterize our open collaborative environment STORM in order to offer a cost-efficient tool to the SMEs and mEs for self-managing their security.

Journal: :مدیریت دولتی 0
ارین قلی پور دانشیار گروه مدیریت دولتی دانشگاه تهران، ایران علی اصغر پورعزت دانشیار گروه مدیریت دولتی دانشگاه تهران، ایران فرشته محمدی دانشجوی کارشناسی ارشد مدیریت دولتی دانشگاه تهران، ایران

one of the most hot topic in recent years in management is organizational identity and more important than it, is identity construction which ignored in researches. nowadays in most of the public organizations, the increase of turnover rate, reducing employees` job satisfaction, increasing the amount of job absent, developing job alienation, and lack of accepting responsibility sense and genera...

2015
Eiji Hayashi Lorrie F. Cranor Anind K. Dey Stuart Schechter

......................................................................................................................... iii! Acknowledgements ......................................................................................................... iv! Table of

2008
Jaap-Henk Hoepman Rieks Joosten Johanneke Siljee

Abstract. Several frameworks for identity management exist, each of them with its own distinguishing features. These frameworks are complex however, and their features not easily understood. This makes it hard for businesses to understand the intricacies, and difficult to select and deploy one. This paper develops business selection criteria and applies them to four popular identity management ...

2009
Elisa Bertino Federica Paci Ning Shang

Tools and techniques for digital identity management represent an important technology for enabling transactions and interactions across the Internet. Because identity information is often privacy sensitive, it is important that suitable privacy and security techniques be adopted for its protection. In this paper we discuss relevant concepts and issues and survey an approach based on the notion...

Journal: :TheoLogica: An International Journal for Philosophy of Religion and Philosophical Theology 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید