Results 1 to 10 of about 268,998 (233)

Cybersecurity Risk Management Framework for Blockchain Identity Management Systems in Health IoT [PDF]

open access: yesSensors, 2022
Blockchain (BC) has recently paved the way for developing Decentralized Identity Management (IdM) systems for different information systems. Researchers widely use it to develop decentralized IdM systems for the Health Internet of Things (HIoT).
Bandar Alamri   +2 more
doaj   +2 more sources

The OLYMPUS Architecture—Oblivious Identity Management for Private User-Friendly Services [PDF]

open access: yesSensors, 2020
Privacy enhancing technologies (PETs) allow to achieve user’s transactions unlinkability across different online Service Providers. However, current PETs fail to guarantee unlinkability against the Identity Provider (IdP), which becomes a single ...
Rafael Torres Moreno   +8 more
doaj   +2 more sources

DIdM-EIoTD: Distributed Identity Management for Edge Internet of Things (IoT) Devices [PDF]

open access: yesSensors, 2023
The Internet of Things (IoT) paradigm aims to enhance human society and living standards with the vast deployment of smart and autonomous devices, which requires seamless collaboration.
Kazi Masum Sadique   +2 more
doaj   +2 more sources

CAPITAL STRUCTURE AND FIRM FINANCIAL PERFORMANCE OF LISTED DEPOSIT MONEY BANKS IN NIGERIA: MODERATING EFFECT OF BOARD FINANCIAL LITERACY

open access: yesGusau Journal of Accounting and Finance, 2023
The purpose of this work is to examine the interaction of members of the board with financial knowledge on the association among capital structure with firm financial performance in the Nigeria DMBs.
Anas Idris Abdulwahab   +3 more
doaj   +1 more source

FAIDM for Medical Privacy Protection in 5G Telemedicine Systems

open access: yesApplied Sciences, 2021
5G networks have an efficient effect in energy consumption and provide a quality experience to many communication devices. Device-to-device communication is one of the key technologies of 5G networks.
Tzu-Wei Lin, Chien-Lung Hsu
doaj   +1 more source

Formalising Identity Management protocols [PDF]

open access: yes2016 14th Annual Conference on Privacy, Security and Trust (PST), 2016
In this paper we present the formalisation of three well-known Identity Management protocols - SAML, OpenID and OAuth. The formalisation consists of two steps: formal specification using HLPSL (High-Level Protocol Specification Language) and formal verification using a state-of-the-art verification tool for security protocols called AVISPA (Automated ...
Ferdous, Md Sadek, Poet, Ron
openaire   +2 more sources

Identity management [PDF]

open access: yesJournal of Physics: Conference Series, 2008
The broad aim of identity management (IdM) is to manage the resources of an organization (such as files, records, data, and communication infrastructure and services) and to control and manage access to those resources in an efficient and accurate way. Consequently, identity management is both a technical and process-orientated concept.
Kumbesan Sandrasegaran, Mo Li
openaire   +2 more sources

Efficient Certification of Endpoint Control on Blockchain

open access: yesIEEE Access, 2021
Proving that an endpoint (e.g. URL, telephone number, etc.) is controlled by a subject is crucial in many applications. In the web, this is witnessed by the widespread adoption of HTTPS.
Diego Pennino   +3 more
doaj   +1 more source

Toward Patient-Centric Healthcare Systems: Key Requirements and Framework for Personal Health Records Based on Blockchain Technology

open access: yesApplied Sciences, 2023
Healthcare data are considered sensitive and confidential, and storing these sensitive data in traditional (i.e., centralized) databases may expose risks, such as penetration or data leaks.
Ohud Aldamaeen   +2 more
doaj   +1 more source

Exploiting Misconfiguration Vulnerabilities in Microsoft’s Azure Active Directory for Privilege Escalation Attacks

open access: yesFuture Internet, 2023
Cloud services provided by Microsoft are growing rapidly in number and importance. Azure Active Directory (AAD) is becoming more important due to its role in facilitating identity management for cloud-based services.
Ibrahim Bu Haimed   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy