Search Results

Filter
  • 1-10 of  293 results for ""IDENTITY management systems""
Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request
Conference

Executable Model-Based Risk Assessment Method for Identity Management Systems.

Subjects: RISK assessment; COMPUTER network security; STAKEHOLDERS

  • Source: Norwegian Information Security Conference / Norsk Informasjonssikkerhetskonferanse; Nov2012, Special section p6-18, 13p

Record details

×
Conference

Privacy Preservation and Mandate Representation In Identity Management Systems.

Subjects: IDENTITY management systems; ELECTRONIC services; IDENTIFICATION

  • Source: CISTI (Iberian Conference on Information Systems & Technologies / Conferência Ibérica de Sistemas e Tecnologias de Informação) Proceedings; 2019, p1-6, 6p

Record details

×
Conference

An Overview of Identity Management Systems Usage.

Subjects: IDENTITY management systems; ONLINE information services

  • Source: Central European Conference on Information & Intelligent Systems; 2017, p125-131, 7p

Record details

×
Conference

A comparative analysis of Identity Management Systems.

  • Source: 2012 International Conference on High Performance Computing & Simulation (HPCS); 1/ 1/2012, p454-461, 8p

Record details

×
Conference

Defining Cloud Identity Security and Privacy Issues: A Delphi Method.

Subjects: CLOUD computing; DELPHI method; IDENTITY theft

  • Source: Proceedings of the Americas Conference on Information Systems (AMCIS); 2019, p1-10, 10p

Record details

×
  • 1-10 of  293 results for ""IDENTITY management systems""