نتایج جستجو برای: sso social security organization

تعداد نتایج: 983212  

2003
Kurt Geihs Robert Kalcklösch A. Grode

Support for Single Sign-On (SSO) is a frequently voiced requirement for Service-Oriented Computing. We discuss SSO strategies and approaches, their requirements and constraints. The two most prominent approaches in this field are presented, i.e. Microsoft Passport and Liberty Alliance. Because implementations of Liberty were not widely available and in order to understand the conceptual implica...

Dr. Seyed Taghi Noorbakhsh died in a tragic car accident on Nov 15th 2018, while on an official mission in Golestan Province in Iran. There is a great emptiness left by Dr.Noorbakhsh’s passing. He will be missed by his colleagues andthousands of his patients whom he helped during his career.In addition to being a board member of Iranian Orthopedic Association (IOA), for consecutive terms & Chie...

2016
Tayibia Bazaz Aqeel Khalique

In today’s digital era, users are increasingly accessing countless number of applications every day. For accessing these services, the users first have to authenticate themselves and need to maintain a separate set of username and password for each application. This led to the development of Single Sign On (SSO). This paper presents review on SSO enabling technologies and discusses SSO architec...

Journal: :پژوهشنامه مدیریت تحول 0
محمد محمودی میمند علی اصغر شیره پزآرانی میثم نوابی عباس کاظمی بیدگلی

trust is an important element in human relations and cooperation between members of the organization. trust can be the interpersonal or inter-group, in special mode; or be generalized and related to the whole organization in general mode. special-generalized trust as a complex interactive process is influenced by various personal and social factors and variables. some of the most important fact...

2009
Santos M. Galvez Indira R. Guzman

In this paper, we present a social/behavioral meta-study of good corporate information security practices. The research model combines social cognitive theory and control theory in order to explain the individual and environmental factors that influence corporate information security behavior. The model includes employees’ beliefs about their abilities to competently use computer information se...

2014
Steffi Haag Andreas Eckhardt

Motivated by recent practical observations of employees’ unapproved sourcing of cloud services at work, this study empirically evaluates bring your own cloud (BYOC) policies and social interactions of the IT department to sensitize employees’ security risk perception. Based on social information processing theory, BYOC strategies varying in the level of restriction from the obligatory, recommen...

Background and Objectives: Considering the importance of the radiology department, which devours most of the financial resources, efficiency and effectiveness in this department is one of the main concern of policymakers in most health care systems. The aim of this study was to investigate the efficiency and effectiveness of a radiology department before and after the implement...

This paper tries to address the impact of the Shanghai Cooperation Organization on Central Asian security. This organization was established on April 26, 1996 to settle security and territorial disputes between China and Russia and Central Asian countries (other than Uzbekistan and Turkmenistan). After the accession of Uzbekistan to this assembly, the level of the organization was promoted, and...

This paper tries to address the impact of the Shanghai Cooperation Organization on Central Asian security. This organization was established on April 26, 1996 to settle security and territorial disputes between China and Russia and Central Asian countries (other than Uzbekistan and Turkmenistan). After the accession of Uzbekistan to this assembly, the level of the organization was promoted, and...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید