Results 201 to 210 of about 268,998 (233)
Goal-setting mechanisms in educational management: a psychological perspective on student and teacher behavior. [PDF]
Wang Y, Tang S, Meng Y.
europepmc +1 more source
Towards FAIR and federated data ecosystems for interdisciplinary research. [PDF]
Beyvers S +5 more
europepmc +1 more source
When dirty work meets social identity: decoding career avoidance intentions of Chinese hospitality students. [PDF]
Hu X, Liang B, Chen Z, Xie S, Li Z.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Proceedings of the 2007 international ACM conference on Conference on supporting group work - GROUP '07, 2007
As the use of social networking websites becomes increasingly common, the types of social relationships managed on these sites are becoming more numerous and diverse. This research seeks to gain an understanding of the issues related to managing different social networks through one system, in particular looking at how users of these systems present ...
Joan Morris DiMicco, David R. Millen
openaire +2 more sources
As the use of social networking websites becomes increasingly common, the types of social relationships managed on these sites are becoming more numerous and diverse. This research seeks to gain an understanding of the issues related to managing different social networks through one system, in particular looking at how users of these systems present ...
Joan Morris DiMicco, David R. Millen
openaire +2 more sources
Identity management architecture
2008 IEEE International Conference on Intelligence and Security Informatics, 2008Identity Management plays a crucial role in many application contexts, including e-Governments, e-Commerce, business intelligence, investigation, and homeland security. The variety of approaches to and techniques for identity management, while addressing some of the challenges, have introduced new problems, especially concerning interoperability and ...
Uwe Glässer, Mona Vajihollahi
openaire +1 more source
2006
This chapter provides an introductory overview of identity management as it relates to data networking and enterprise information management systems. It looks at the strategic value of identity management in corporate and government environments. It defines the terms, concepts, and technologies associated with identity management.
Katherine M. Hollis, David M. Hollis
+4 more sources
This chapter provides an introductory overview of identity management as it relates to data networking and enterprise information management systems. It looks at the strategic value of identity management in corporate and government environments. It defines the terms, concepts, and technologies associated with identity management.
Katherine M. Hollis, David M. Hollis
+4 more sources
Diplomová práce je rozdělena do dvou částí. V první z nich je na teoretické úrovni zpracována oblast Identity Managementu. Jsou zde popsány jednotlivé oblasti Identity Managementu, kam patří autentizace, autorizace a audit. Dále se tato část zabývá problematikou Single Sign-On, tedy využití jednoho přihlášení k přístupu k více nezávislým systémům či ...
Mike Just, Carlisle Adams
+6 more sources
Mike Just, Carlisle Adams
+6 more sources
2011
In this chapter we provide overviews of the notion of identity and of identity management in Sections 1 and 2, respectively. In section 3 we describe a conceptual identity management model as well as a number of practical models. We also cover a number of related topics including Single Sign-On, Level of Assurance, identity source discovery, security ...
+4 more sources
In this chapter we provide overviews of the notion of identity and of identity management in Sections 1 and 2, respectively. In section 3 we describe a conceptual identity management model as well as a number of practical models. We also cover a number of related topics including Single Sign-On, Level of Assurance, identity source discovery, security ...
+4 more sources
2006
Modern managers might well ask ‘who are we and what are we becoming’? Two decades of downsizing, delayering, corporate liposuction, lean manufacturing, empowerment, knowledge management and networked organization have shaken traditional assumptions about management to their foundations.
openaire +2 more sources
Modern managers might well ask ‘who are we and what are we becoming’? Two decades of downsizing, delayering, corporate liposuction, lean manufacturing, empowerment, knowledge management and networked organization have shaken traditional assumptions about management to their foundations.
openaire +2 more sources

