Search

Your search keyword '"IDENTITY management systems"' showing total 715 results

Search Constraints

Start Over You searched for: Descriptor "IDENTITY management systems" Remove constraint Descriptor: "IDENTITY management systems"
715 results on '"IDENTITY management systems"'

Search Results

2. Resilient Risk-Based Adaptive Authentication and Authorization (RAD-AA) Framework

3. A blockchain‐based secure framework for data management.

4. MetaSSI: A Framework for Personal Data Protection, Enhanced Cybersecurity and Privacy in Metaverse Virtual Reality Platforms.

5. Decentralized Identity Authentication Mechanism: Integrating FIDO and Blockchain for Enhanced Security.

6. Meet The Enablers Of A Connected World.

7. The frontstage-backstage of organizational identity and management control system: the tale of British Petroleum's embarrassment in DWH.

8. Getting Started with Corda.

9. Theorizing Omission: State Strategies for Withholding Official Recognition of Personhood.

10. Reflections on the PCC Wikidata Pilot at UCLA Library: Undertaking the PCC Learning Objectives.

12. Analyzing and comparing the security of self-sovereign identity management systems through threat modeling.

13. USER CENTRIC APPROACH TO IDENTITY MANAGEMENT IN CLOUD COMPUTING ENVIRONMENT: AN EMPIRICALLY TESTED FRAMEWORK.

14. Necessity of reliable self-sovereign identity management framework for resource constrained IoT devices.

15. Digitale Identitäten als Fundament des Web 3.0.

16. A Distributed and Secure Self-Sovereign-Based Framework for Systems of Systems.

17. A Multi-Round Zero Knowledge Proof Algorithm for Secure IoT and Blockchain Environments.

18. T-FIM: Transparency in Federated Identity Management for Decentralized Trust and Forensics Investigation.

19. Exploiting Misconfiguration Vulnerabilities in Microsoft's Azure Active Directory for Privilege Escalation Attacks.

20. Development of a Secure Decentralized Identity Management System using Blockchain Technology.

21. MANAGEMENTUL ACCESULUI ŞI AL IDENTITĂŢILOR ÎN INFRASTRUCTURILE IoT.

22. Holistic Security In The Age Of Digitalization.

23. Digital Carbon Accounting for Accelerating Decarbonization: Characteristics of ISEnabled System Architectures.

24. Towards an Improved Taxonomy of Attacks Related to Digital Identities and Identity Management Systems.

25. Ensuring Academic Integrity and Trust in Online Learning Environments: A Longitudinal Study of an AI-Centered Proctoring System in Tertiary Educational Institutions.

26. DIdM-EIoTD: Distributed Identity Management for Edge Internet of Things (IoT) Devices.

27. A framework of blockchain-based secure and privacy-preserving E-government system.

29. ENHANCED ANALYSIS OF BLOCKCHAIN BASED FINANCIAL INSTITUTIONS.

30. Peer-to-Peer User Identity Verification Time Optimization in IoT Blockchain Network.

31. Cybersecurity Risk Management Framework for Blockchain Identity Management Systems in Health IoT.

32. Precise indoor location system using Ultra-Wideband technology.

33. A Bibliometric Study of Scientific Production on Self-Sovereign Identity.

34. CYBERSECURITY: Implementation of Executive Order Requirements Is Essential to Address Key Actions.

35. Advanced Authentication Mechanisms for Identity and Access Management in Cloud Computing.

36. Evolving cybersecurity landscape – Comparing the regulatory approaches in the EU, in China and in Singapore — An analysis of legislative approaches to key issues in tackling a global phenomenon.

37. Towards Improving Privacy and Security of Identity Management Systems Using Blockchain Technology: A Systematic Review.

38. Digital Identity Verification and Management System of Blockchain-Based Verifiable Certificate with the Privacy Protection of Identity and Behavior.

39. Health-zkIDM: A Healthcare Identity System Based on Fabric Blockchain and Zero-Knowledge Proof.

40. Detection Method for Randomly Generated User IDs: Lift the Curse of Dimensionality

41. Decentralization Using Quantum Blockchain: A Theoretical Analysis

42. Self-Sovereignty Identity Management Model for Smart Healthcare System.

43. NEW PRODUCTS.

44. Self-Sovereign Identity Systems : Evaluation Framework

45. Improving the security of real world identity management systems

46. Design Considerations for Protection of Blockchain based Digital Identity Ecosystem.

47. Device life cycle management requirements for identity and access management in the factory of future environment.

48. A Scalable Block Chain Framework for User Identity Management in a Decentralized Network.

49. "He Lied to the People, Saying 'I Am Nebuchadnezzar'": Issues in Authority Control for Rebels, Usurpers, Eccentric Nobility, and Dissenting Royalty.

50. Enhanced Multilevel Fuzzy Inference System for Risk Adaptive Hybrid RFID Access Control System.

Catalog

Books, media, physical & digital resources