نتایج جستجو برای: thus offering solutions for identity management

تعداد نتایج: 10878504  

Journal: :JCP 2017
Ali Alkhalifah Sulaiman Al Amro

Privacy concerns are one of the most important issues in today‘s technology-based setting. Previous studies show that privacy concerns negatively influenced the individual’s behavioral intention toward a particular Web-based service or technology. However, researchers have not explored the role of privacy concerns in identity management systems (IdMS) adoption. Previous identity management stud...

2010
John C. Stewart Kirk M. Anne

Recent legislation requires that institutions of higher learning to take steps to ensure that the student of record enrolled in the course is the one taking the tests on line, accessing the information systems, and receiving academic credit for the course. We suggest that keystroke biometric systems can play a role in access control for purposes of identity management systems in conjunction wit...

2008
Martin Juhrisch Gunnar Dietz

Especially in the university context the configuration of identity management systems, the management of roles and their assignment to users is a highly complex task. To simplify this we propose an automated linking of the identity management system to business process models which contain organizational responsibilities. Based on the Eplus approach [JW08] we introduce a modelling grammar and a...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده علوم 1390

throughout this dissertation r is a commutative ring with identity and m is a unitary r-module. in this dissertation we investigate submodules of multiplication , prufer and dedekind modules. we also stat the equivalent conditions for which is ring , wher l is a submodule of afaithful multiplication prufer module. we introduce the concept of integrally closed modules and show that faithful mu...

2011
Jostein Jensen

Federated Identity Management is considered a promising approach to facilitate secure resource sharing between collaborating partners. A structured survey has been carried out in order to document the benefits of adopting such systems from a user and business perspective, and also to get an indication on how Integrated Operations in the oil and gas industry can benefit from identity federations...

Journal: :Open Journal of Business and Management 2015

2010
François Andry Erik-Paul Gibson Goutham Naval Thomas Odenwald Ben Vigil Frank Yu Karsten Klein

Portals are Web-based applications that give users a centralized point of access for information and applications of relevance. Therefore the portal paradigm is an attractive proposition for healthcare because it offers a solution to rapidly aggregate heterogeneous applications and services while offering a high level of customization and personalization to the users, patients, care givers and ...

2005
M. Casassa Mont R. Thyne K. Chan P. Bramhall

This paper describes issues and requirements related to privacy management as an aspect of improved governance in enterprises. It focuses on the privacy enforcement aspect, in particular related to privacy-aware access control and enforcement of privacy obligations: this is still a green field and, at the same time, is a key aspect to be taken into account to ensure compliance both with regulat...

2011
Waleed A. Alrodhan

Information Card-based Identity Management (ICIM) is one of the most prominent user-centric schemes. In this paper we identify two security flaws in ICIM systems that may lead to a serious privacy violation. The first is the reliance on Internet user judgements of the authenticity of service providers, and the second is the reliance of the system on a single layer of authentication. We also pro...

2003
Pierangela Samarati

Our daily activities increasingly rely on remote resources and services — specifically, on interactions between different, remotely located parties. Because these parties might (and sometimes should) know little about each other, digital identities — electronic representations of individuals’ or organizations’ sensitive information — help introduce them to each other and control the amount of i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید