نتایج جستجو برای: thus offering solutions for identity management

تعداد نتایج: 10878504  

2005
Audun Jøsang Simon Pope

Identity management is traditionally seen from the service providers’ point of view, meaning that it is an activity undertaken by the service provider to manage service user identities. Traditional identity management systems are designed to be cost effective and scalable primarily for the service providers, but not necessarily for the users, which often results in poor usability. Users are, fo...

زیاری, کرامت‌الله, مهدی, علی, مهدیان بهنمیری, معصومه,

Nowadays, the necessity for employing IT and paving the ground for electronic managing of the cities across the nation and utilizing such knowledge for regulating urban issues, with regard to demanding responsibilities of urban management, especially the municipality, is quite clear to all. Such a necessity better manifests itself when we become aware of the fact that, for the time being, many ...

Journal: :Information Polity 2010
Malcolm Crompton

There are many drivers for strengthening identity management (IdM) in the digital environment. They include: countering identity fraud, identity theft or identity takeover, border control and traveler identification; individual convenience; or better customer service for individuals. A range of approaches are being considered in the public and private sector. Experience is showing that IdM succ...

Journal: :hospital practice and research 0
reza shakoori ahvaz university of medical sciences and health services, ahvaz, iran masoume bagheri-kahkesh health services management department, sciences and research branch, islamic azad university, tehran, iran

background: drugs play a strategic role as a health commodity. thus, the supply chain management of drugs is an important issue to reducing costs and thereby improving patient health. objective: this study evaluated the status of drug supply chain management and health reform in the pharmaceutical sector of teaching hospitals in ahvaz, iran. methods: this cross-sectional study was carried out i...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1389

after the soviet union dissolution, a chaotic period was begun in the russia. russia lost its glory and felt disgrace. the first group of elites came to power under yeltsin; they tried to re-define russia’s identity as a european country and build a foreign policy on this baseline. therefore russia tried to become closer with the west especially with the u.s. according to their view the sovie...

2007
Audun Jøsang Mohammed Al Zomai Suriadi Suriadi

Digital identities represent who we are when engaging in online activities and transactions. The rapid growth in the number of online services leads to an increasing number of different identities that each user needs to manage. As a result, many people feel overloaded with identities and suffer from password fatigue. This is a serious problem and makes people unable properly control and protec...

2006
Pietro Michiardi Refik Molva

This paper presents a message authentication scheme built on top of an original construct that combines a simple form of identity based cryptography with an iterated version of RSA. Our scheme blends the features of identity based cryptography and stream authentication while at the same time offering security comparable to that of the basic RSA cryptosystem. As opposed to other authentication s...

2011
Mehmud Abliz

Many federated identity management systems have been proposed to solve the problem of authorizing users across security domains. Although these solutions attempt to follow the user-centric design approach to empower users by letting them make important decisions on whether to release sensitive information, they do not provide much help to users in making good decisions. More importantly, privac...

2006
Marco Casassa Mont Siani Pearson Robert Thyne

Privacy management is important for enterprises that handle personal data: they must deal with privacy laws and people’s expectations. Currently much is done by means of manual processes, which make them difficult and expensive to comply. Key enterprises’ requirements include: automation, simplification, cost reduction and leveraging of current identity management solutions. This paper describe...

2009
Andreas Pfitzmann Katrin Borcea-Pfitzmann

The design of identity management preserving an individual’s privacy must not stop at supporting the user in managing her/his present identities. Instead, since any kind of privacy intrusion may have implications on the individual’s future life, it is necessary that we identify and understand the issues related to longterm aspects of privacyenhancing identity management. Only that way, accordin...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید