نتایج جستجو برای: thus offering solutions for identity management
تعداد نتایج: 10878504 فیلتر نتایج به سال:
PRIME envisions that individuals will be able to interact in the information society in a secure and safe way while retaining control of their privacy. While there already exists a fair number of privacy enhancing technologies allowing to build identity management systems that come surprisingly close to realize this vision, there still are considerable gaps between these technologies and whole ...
Identity management systems require consolidating the diversity of many user repositories, the creation of roles and their assignment to the identity management software. To decrease administration costs we propose linking the identity management system to business process models which contain the organizational responsibilities. Therefore, we introduce a modeling grammar to model web-services ...
Equipment selection is a key factor in modern construction industry. As it is a complex factor, current models offered by literatures fail to provide adequate solutions for major issues like systematic evaluation of soft factors and weighting of soft benefits in comparison with costs. This paper aims at making a comparative study between GA and AHP by utilising MATLAB as a tool. It is a conveni...
The System for Cross-Domain Identity Management (SCIM) specification is designed to make managing user identity in cloud based applications and services easier. The specification suite builds upon experience with existing schemas and deployments, placing specific emphasis on simplicity of development and integration, while applying existing authentication, authorization, and privacy models. Its...
Oracle Corporation, the world’s second largest software company, is the leading supplier of software for enterprise information management. The company has two major businesses-one providing the lowest cost information technology infrastructure and another offering business and competitive advantage through high-value applications Oracle is one of the first software companies to implement its m...
Given that Peighambarieh street in the historical context And valuable Qazvin, Which has historical and cultural, But it seems This street appeared during the time period until today, There were many inconsistencies, Therefore, it is necessary that this study, considering all the physical and non-cellular factors affecting the range, Provide solutions for it. Research Objectives include: 1- Rec...
Vendor selection decisions are complicated by the fact that various conflicting multi-objective factors must be considered in the decision making process. The problem of vendor selection becomes still more compli-cated with the inclusion of incremental discount pricing schedule. Such hard combinatorial problems when solved using meta heuristics produce near optimal solutions. This paper propose...
به طور کلی در فرآیندهای مارکوف ارگودیک دو بعدی یافتن فرم بسته توزیع ایستا، تنها برای حالات خیلی خاص امکان پذیر است. با توجه به این مشکل و نیز با توجه به اهمیت توزیع ایستا، بررسی و مطالعه رفتار مجانبی توزیع ایستای این فرآیندها مورد توجه قرار گرفته است. زنجیر قدم زدن تصادفی دو بعدی که در برخی متون به آن، فرآیند qbd دو طرفه نیز می گویند، یکی از این فرآیندها است. یک فرآیند qbd زمان گسسته یک زنجیر م...
A comprehensive and feasible model that delineates the interrelationships among diversified learning mechanisms, information management and knowledge creation is absent. This study aims to fill this void. Unlike previous research, this study investigates the causality of knowledge creation from two different perspectives: information management strategy, i.e. distributed data application and ad...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید