Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Identity management")

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 55

  • Page / 3
Export

Selection :

  • and

Healthcare applications of federated identity managementMEAD, Brian; WRIGHT, David J.International journal of electronic business. 2005, Vol 3, Num 1, pp 88-105, issn 1470-6067, 18 p.Conference Paper

Performance analysis of a cross-layer SSO mechanism for a roaming infrastructureSDNCHEZ, Manuel; LOPEZ, Gabriel; CANOVAS, Oscar et al.Journal of network and computer applications. 2009, Vol 32, Num 4, pp 808-823, issn 1084-8045, 16 p.Article

A user-centric federated single sign-on systemSURIADI, Suriadi; FOO, Ernest; JØSANG, Audun et al.Journal of network and computer applications. 2009, Vol 32, Num 2, pp 388-401, issn 1084-8045, 14 p.Conference Paper

Using one-time passwords to prevent password phishing attacksHUANG, Chun-Ying; MA, Shang-Pin; CHEN, Kuan-Ta et al.Journal of network and computer applications. 2011, Vol 34, Num 4, pp 1292-1301, issn 1084-8045, 10 p.Article

THE Changing Face OF IDENTITY MANAGEMENTDAVIS KHO, Nancy.EContent (Wilton, Conn.). 2009, Vol 32, Num 3, pp 20-25, issn 1525-2531, 6 p.Article

Federated Identity Management: We Built It; Why Won't They Come? : Technology TransferJENSEN, Jostein; GILJE JAATUN, Martin.IEEE security & privacy. 2013, Vol 11, Num 2, pp 34-41, issn 1540-7993, 8 p.Article

Efficient Consistency Achievement of Federated Identity and Access Management Based on a Novel Self-Adaptable ApproachCHA, Shi-Cho; CHANG, Hsiang-Meng.IEICE transactions on information and systems. 2012, Vol 95, Num 2, pp 577-587, issn 0916-8532, 11 p.Article

Privacy-preserving identity federations in the cloud: a proof of conceptDOS SANTOS, Daniel Ricardo; NASCIMENTO, Tiago Jaime; WESTPHALL, Carla Merkle et al.International journal of security and networks (Print). 2014, Vol 9, Num 1, pp 1-11, issn 1747-8405, 11 p.Article

Identity crisis: Global challenges of identity protection in a networked worldKNIGHT, Alison; SAXBY, Steve.Computer law and security report. 2014, Vol 30, Num 6, pp 617-632, issn 0267-3649, 16 p.Article

BlindIdM: A privacy-preserving approach for identity management as a serviceNUNEZ, David; AGUDO, Isaac.International journal of information security (Print). 2014, Vol 13, Num 2, pp 199-215, issn 1615-5262, 17 p.Article

A hierarchical Naive Bayes model for approximate identity matchingWANG, G. Alan; ATABAKHSH, Homa; CHEN, Hsinchun et al.Decision support systems. 2011, Vol 51, Num 3, pp 413-423, issn 0167-9236, 11 p.Article

Identity management for improved organisational efficiency and e-business growth : managing enterprise knowledgeSAXENA, Anshu; BHATIA, Satinder.International journal of information technology and management. 2005, Vol 4, Num 3, pp 321-342, issn 1461-4111, 22 p.Article

Trusted computing enhanced user authentication with OpenID and trustworthy user interfaceLEICHER, Andreas; SCHMIDT, Andreas U; SHAH, Yogendra et al.International journal of internet technology and secured transactions (Print). 2011, Vol 3, Num 4, pp 331-353, issn 1748-569X, 23 p.Article

Characteristic trade-offs in designing large-scale biometric-based identity management systemsSHAIKH, Siraj A; RABAIOTTI, Joseph R.Journal of network and computer applications. 2010, Vol 33, Num 3, pp 342-351, issn 1084-8045, 10 p.Article

TRIMS, a privacy-aware trust and reputation model for identity management systemsGOMEZ MARMOL, Félix; GIRAO, Joao; MARTINEZ PEREZ, Gregorio et al.Computer networks (1999). 2010, Vol 54, Num 16, pp 2899-2912, issn 1389-1286, 14 p.Article

Adding Federated Identity Management to OpenStackCHADWICK, David W; SIU, Kristy; CRAIG LEE et al.Journal of grid computing. 2014, Vol 12, Num 1, pp 3-27, issn 1570-7873, 25 p.Article

Authentication Trust Metric and Assessment for Federated Identity Management Systems : Trust, Security and Privacy in Computing and Communication SystemsGOMI, Hidehito.IEICE transactions on information and systems. 2012, Vol 95, Num 1, pp 29-37, issn 0916-8532, 9 p.Article

Practical versus moral identities in identity managementMANDERS-HUITS, Noëmi.Ethics and information technology. 2010, Vol 12, Num 1, pp 43-55, issn 1388-1957, 13 p.Article

Interworked WiMAX-3G Cellular Data Networks: An Architecture for Mobility Management and Performance EvaluationMUNASINGHE, Kumudu S; JAMALIPOUR, Abbas.IEEE transactions on wireless communications. 2009, Vol 8, Num 4, pp 1847-1853, issn 1536-1276, 7 p.Article

Consolidated Identity Management System for secure mobile cloud computingKHALIL, Issa; KHREISHAH, Abdallah; AZEEM, Muhammad et al.Computer networks (1999). 2014, Vol 65, pp 99-110, issn 1389-1286, 12 p.Article

Data minimisation in communication protocols: a formal analysis framework and application to identity managementVEENINGEN, Meilof; DE WEGER, Benne; ZANNONE, Nicola et al.International journal of information security (Print). 2014, Vol 13, Num 6, pp 529-569, issn 1615-5262, 41 p.Article

Identity management and trusted interaction in Internet and mobile computingJØSANG, Audun.IET information security (Print). 2014, Vol 8, Num 2, pp 67-79, issn 1751-8709, 13 p.Article

Identity matching and information acquisition: Estimation of optimal threshold parametersALIREZAZADEH, Pantea; BOYLU, Fidan; GARFINKEL, Robert et al.Decision support systems. 2014, Vol 57, pp 160-171, issn 0167-9236, 12 p.Article

OAuth Web Authorization ProtocolLEIBA, Barry.IEEE internet computing. 2012, Vol 16, Num 1, pp 74-77, issn 1089-7801, 4 p.Article

A QoS-aware VoD resource sharing scheme for heterogeneous networksHUANG, Chenn-Jung; HU, Kai-Wen; CHEN, You-Jia et al.Computer networks (1999). 2009, Vol 53, Num 7, pp 1087-1098, issn 1389-1286, 12 p.Article

  • Page / 3