نتایج جستجو برای: practical identity
تعداد نتایج: 347233 فیلتر نتایج به سال:
Wireless sensor networks are being deployed for a wide variety of applications. It is an important challenge to find out practical security protocols for wireless sensor networks due to limitation of power, computation and storage resources. Symmetric key techniques are attractive due to their energy efficiency. But the drawbacks of symmetric key techniques are evident in terms of key managemen...
Purpose – This paper seeks to present a scientometric analysis of the Proceedings of the McMaster World Congress on the Management of Intellectual Capital and Innovation for the 1996-2008 period in order to better understand the evolution and identity of the discipline. Design/methodology/approach – Qualitative and quantitative data analysis techniques were applied to determine author distribut...
Many millions of users routinely use their Google accounts to log in to relying party (RP) websites supporting the Google OpenID Connect service. OpenID Connect, a newly standardised single-sign-on protocol, builds an identity layer on top of the OAuth 2.0 protocol, which has itself been widely adopted to support identity management services. It adds identity management functionality to the OAu...
Autobiographical memory is fundamental to the process of self-construction. Therefore, the possibility of modifying autobiographical memories, in particular with memory-modulation and memory-erasing, is a very important topic both from the theoretical and from the practical point of view. The aim of this paper is to illustrate the state of the art of some of the most promising areas of memory-m...
This paper presents a framework for the design of human-centric identity management systems. Whilst many identity systems over the past few years have been labelled as human-centred, we argue that the term has been appropriated by technologists to claim moral superiority of their products, and by system owners who confuse administrative convenience with benefits for users. The framework for hum...
Let pi(w), i = 1, 2, be two densities with common support where each density is known up to a normalizing constant: pi(w) = qi(w)/ci. We have draws from each density (e.g., via Markov chain Monte Carlo), and we want to use these draws to simulate the ratio of the normalizing constants, c1/c2. Such a computational problem is often encountered in likelihood and Bayesian inference, and arises in f...
Let pi(w); i = 1; 2, be two densities with common support where each density is known up to a normalizing constant: pi(w) = qi(w)=ci. We have draws from each density (e.g., via Markov chain Monte Carlo), and we want to use these draws to simulate the ratio of the normalizing constants, c1=c2. Such a computational problem is often encountered in likelihood and Bayesian inference, and arises in e...
A distinguishing feature of virtual communities is their sense of community, i.e., their participants’ feelings of membership, identity, influence, and attachment with each other. This study tests a model in which members’ perceptions of the group’s norms mediate the relationships between supporting each other and identifying each other with the members’ sense of virtual community. Two studies ...
Information assurance is at the core of every initiative that an organization executes. For online universities, a common and complex initiative is maintaining user lifecycle and providing seamless access using one identity in a large virtual infrastructure. To achieve information assurance the management of user privileges affected by events in the user’s identity lifecycle needs to be the det...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید