Results 201 to 210 of about 268,998 (233)

Towards FAIR and federated data ecosystems for interdisciplinary research. [PDF]

open access: yesPLoS Comput Biol
Beyvers S   +5 more
europepmc   +1 more source

Identity management

Proceedings of the 2007 international ACM conference on Conference on supporting group work - GROUP '07, 2007
As the use of social networking websites becomes increasingly common, the types of social relationships managed on these sites are becoming more numerous and diverse. This research seeks to gain an understanding of the issues related to managing different social networks through one system, in particular looking at how users of these systems present ...
Joan Morris DiMicco, David R. Millen
openaire   +2 more sources

Identity management architecture

2008 IEEE International Conference on Intelligence and Security Informatics, 2008
Identity Management plays a crucial role in many application contexts, including e-Governments, e-Commerce, business intelligence, investigation, and homeland security. The variety of approaches to and techniques for identity management, while addressing some of the challenges, have introduced new problems, especially concerning interoperability and ...
Uwe Glässer, Mona Vajihollahi
openaire   +1 more source

Identity Management

2006
This chapter provides an introductory overview of identity management as it relates to data networking and enterprise information management systems. It looks at the strategic value of identity management in corporate and government environments. It defines the terms, concepts, and technologies associated with identity management.
Katherine M. Hollis, David M. Hollis
  +4 more sources

Identity Management

Diplomová práce je rozdělena do dvou částí. V první z nich je na teoretické úrovni zpracována oblast Identity Managementu. Jsou zde popsány jednotlivé oblasti Identity Managementu, kam patří autentizace, autorizace a audit. Dále se tato část zabývá problematikou Single Sign-On, tedy využití jednoho přihlášení k přístupu k více nezávislým systémům či ...
Mike Just, Carlisle Adams
  +6 more sources

Identity Management

2011
In this chapter we provide overviews of the notion of identity and of identity management in Sections 1 and 2, respectively. In section 3 we describe a conceptual identity management model as well as a number of practical models. We also cover a number of related topics including Single Sign-On, Level of Assurance, identity source discovery, security ...
  +4 more sources

Managing Identity

2006
Modern managers might well ask ‘who are we and what are we becoming’? Two decades of downsizing, delayering, corporate liposuction, lean manufacturing, empowerment, knowledge management and networked organization have shaken traditional assumptions about management to their foundations.
openaire   +2 more sources

Home - About - Disclaimer - Privacy