Results 1 to 10 of about 268,998 (233)
Cybersecurity Risk Management Framework for Blockchain Identity Management Systems in Health IoT [PDF]
Blockchain (BC) has recently paved the way for developing Decentralized Identity Management (IdM) systems for different information systems. Researchers widely use it to develop decentralized IdM systems for the Health Internet of Things (HIoT).
Bandar Alamri +2 more
doaj +2 more sources
The OLYMPUS Architecture—Oblivious Identity Management for Private User-Friendly Services [PDF]
Privacy enhancing technologies (PETs) allow to achieve user’s transactions unlinkability across different online Service Providers. However, current PETs fail to guarantee unlinkability against the Identity Provider (IdP), which becomes a single ...
Rafael Torres Moreno +8 more
doaj +2 more sources
DIdM-EIoTD: Distributed Identity Management for Edge Internet of Things (IoT) Devices [PDF]
The Internet of Things (IoT) paradigm aims to enhance human society and living standards with the vast deployment of smart and autonomous devices, which requires seamless collaboration.
Kazi Masum Sadique +2 more
doaj +2 more sources
The purpose of this work is to examine the interaction of members of the board with financial knowledge on the association among capital structure with firm financial performance in the Nigeria DMBs.
Anas Idris Abdulwahab +3 more
doaj +1 more source
FAIDM for Medical Privacy Protection in 5G Telemedicine Systems
5G networks have an efficient effect in energy consumption and provide a quality experience to many communication devices. Device-to-device communication is one of the key technologies of 5G networks.
Tzu-Wei Lin, Chien-Lung Hsu
doaj +1 more source
Formalising Identity Management protocols [PDF]
In this paper we present the formalisation of three well-known Identity Management protocols - SAML, OpenID and OAuth. The formalisation consists of two steps: formal specification using HLPSL (High-Level Protocol Specification Language) and formal verification using a state-of-the-art verification tool for security protocols called AVISPA (Automated ...
Ferdous, Md Sadek, Poet, Ron
openaire +2 more sources
The broad aim of identity management (IdM) is to manage the resources of an organization (such as files, records, data, and communication infrastructure and services) and to control and manage access to those resources in an efficient and accurate way. Consequently, identity management is both a technical and process-orientated concept.
Kumbesan Sandrasegaran, Mo Li
openaire +2 more sources
Efficient Certification of Endpoint Control on Blockchain
Proving that an endpoint (e.g. URL, telephone number, etc.) is controlled by a subject is crucial in many applications. In the web, this is witnessed by the widespread adoption of HTTPS.
Diego Pennino +3 more
doaj +1 more source
Healthcare data are considered sensitive and confidential, and storing these sensitive data in traditional (i.e., centralized) databases may expose risks, such as penetration or data leaks.
Ohud Aldamaeen +2 more
doaj +1 more source
Cloud services provided by Microsoft are growing rapidly in number and importance. Azure Active Directory (AAD) is becoming more important due to its role in facilitating identity management for cloud-based services.
Ibrahim Bu Haimed +2 more
doaj +1 more source

