咨询与建议

限定检索结果

文献类型

  • 7 篇 期刊文献
  • 1 篇 学位论文
  • 1 篇 会议

馆藏范围

  • 9 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7 篇 工学
    • 3 篇 计算机科学与技术...
    • 2 篇 网络空间安全
    • 1 篇 仪器科学与技术
    • 1 篇 信息与通信工程
  • 1 篇 哲学
    • 1 篇 哲学
  • 1 篇 理学
    • 1 篇 数学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 9 篇 identity managem...
  • 3 篇 blockchain
  • 1 篇 internet of thin...
  • 1 篇 secret sharing
  • 1 篇 security threats...
  • 1 篇 payment systems ...
  • 1 篇 access control
  • 1 篇 leadership
  • 1 篇 password encrypt...
  • 1 篇 self-sovereign i...
  • 1 篇 cyber-attack
  • 1 篇 intelligent tran...
  • 1 篇 decentralized id...
  • 1 篇 social identity ...
  • 1 篇 access managemen...
  • 1 篇 lightweight dire...
  • 1 篇 mashup
  • 1 篇 socialidentity m...
  • 1 篇 sso
  • 1 篇 privileged acces...

机构

  • 1 篇 shenzhen institu...
  • 1 篇 school of comput...
  • 1 篇 icnlab school of...
  • 1 篇 复旦大学
  • 1 篇 college of compu...
  • 1 篇 department of ee...
  • 1 篇 software institu...
  • 1 篇 department of'ps...
  • 1 篇 department of di...
  • 1 篇 work researchins...
  • 1 篇 department of ma...
  • 1 篇 department of co...
  • 1 篇 pcl research cen...
  • 1 篇 department of in...
  • 1 篇 department of te...
  • 1 篇 department of ed...
  • 1 篇 department of in...
  • 1 篇 data61 csiro aus...

作者

  • 1 篇 huafang liu
  • 1 篇 shailendra mishr...
  • 1 篇 mohamed ezz
  • 1 篇 rolf van dick
  • 1 篇 fangxing shu
  • 1 篇 shuokang huang
  • 1 篇 alivelu mukkamal...
  • 1 篇 lukas stockburge...
  • 1 篇 mohammed abdul r...
  • 1 篇 王贤鸣
  • 1 篇 yue liu
  • 1 篇 hugo’connor
  • 1 篇 qinghua lu
  • 1 篇 raghava rao mukk...
  • 1 篇 ayman mohamed mo...
  • 1 篇 shiping chen
  • 1 篇 ruibiao chen
  • 1 篇 mansour hammoud ...
  • 1 篇 guangwu xu
  • 1 篇 ding chu qing li...

语言

  • 8 篇 英文
  • 1 篇 中文
检索条件"主题词=Identity management"
9 条 记 录,以下是1-10 订阅
排序:
BIdM:A Blockchain-Enabled Cross-Domain identity management System
收藏 引用
Journal of Communications and Information Networks 2021年 第1期6卷 44-58页
作者: Ruibiao Chen Fangxing Shu Shuokang Huang Lei Huang Huafang Liu Jin Liu Kai Lei ICNLab School of Electronic and Computer EngineeringPeking UniversityShenzhen 518000China PCL Research Center of Networks and Communications Peng Cheng LaboratoryShenzhen 518000China
Reliable identity management and authentication are significant for network *** recent years,as traditional centralized identity management systems suffer from security and scalability problems,decentralized identity ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Blockchain-enabled decentralized identity management:The case of self-sovereign identity in public transportation
收藏 引用
Blockchain(Research and Applications) 2021年 第2期2卷 50-67页
作者: Lukas Stockburger Georgios Kokosioulis Alivelu Mukkamala Raghava Rao Mukkamala Michel Avital Department of Digitalization Copenhagen Business SchoolHowitzvej 60FrederiksbergDK-2000Denmark Department of Technology Kristiania University CollegeKirkegata 24-260153 OsloNorway
identity management has been ripe for disruption over the past few years due to recurring incidents of data breaches that have led to personal information leaks and identity *** rise of blockchain technology has paved... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Open identity management Framework for Mashup
Open Identity Management Framework for Mashup
收藏 引用
2010 IEEE 2nd Symposium on Web Society
作者: Ding Chu,Qing Liao,Jingling Zhao Beijing University of Posts and Telecommunications,Beijing,P.R.China
<正>Mashups have emerged as a Web 2.0 phenomenon,connecting disjoint applications together to provide unified ***, scalable access control for mashups is *** enable a mashup to gather data from legacy applications a... 详细信息
来源: cnki会议 评论
Advanced Authentication Mechanisms for identity and Access management inCloud Computing
收藏 引用
Computer Systems Science & Engineering 2022年 第12期43卷 967-984页
作者: Amjad Alsirhani Mohamed Ezz Ayman Mohamed Mostafa College of Computer and Information Sciences Jouf UniversitySakaka72314Saudi Arabia
identity management is based on the creation and management of useridentities for granting access to the cloud resources based on the user *** cloud identity and access management (IAM) grants the authorization tothe ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Capability-based IoT access control using blockchain
收藏 引用
Digital Communications and Networks 2021年 第4期7卷 463-469页
作者: Yue Liu Qinghua Lu Shiping Chen Qiang Qu Hugo’Connor Kim-Kwang Raymond Choo He Zhang School of Computer Science and Engineering University of New South WalesAustralia Data61 CSIROAustralia Shenzhen Institutes of Advanced Technology Chinese Academy of SciencesChina Department of Information Systems and Cyber Security University of Texas at San AntonioUSA Software Institute Nanjing UniversityChina
Internet of Things(IoT)devices facilitate intelligent service delivery in a broad range of settings,such as smart offices,homes and ***,the existing IoT access control solutions are mainly based on conventional identi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
identity Governance Framework for Privileged Users
收藏 引用
Computer Systems Science & Engineering 2022年 第3期40卷 995-1005页
作者: Mansour Hammoud Alruwies Shailendra Mishra Mohammed Abdul Rahman AlShehri Department of Information Technology College of Computer and Information SciencesMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Computer Engineering College of Computer and Information SciencesMajmaah UniversityMajmaah11952Saudi Arabia
Information technology companies have grown in size and recognized the need to protect their valuable *** a result,each IT application has its authentication mechanism,and an employee needs a username and *** the numb... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Passwords management via Split-Key
收藏 引用
Journal of Information Security 2016年 第3期7卷 206-214页
作者: Kenneth Giuliani V. Kumar Murty Guangwu Xu Department of Mathematics University of Toronto Toronto Canada Department of EE & CS University of Wisconsin-Milwaukee Milwaukee WI USA
This paper proposes a scheme for password management by storing password encryptions on a server. The method involves having the encryption key split into a share for the user and one for the server. The user’s share... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
The Social identity Approach to Effective Leadership: An Overview and Some Ideas on Cross-Cultural Generalizability
收藏 引用
Frontiers of Business Research in China 2016年 第3期10卷 363-384页
作者: Rolf van Dick Rudolf Kerschreiter Department of'Psychology Goethe University 60323 Frankfurt Germany Work ResearchInstitute (AFI) Oslo Norway Department of Education and Psychology Freie Universitat Berlin 14195 Berlin Germany
When employees identify with the groups and organizations they work for, this typically has positive implications for work-related attitudes and behaviors. The present paper provides a focused overview of the social i... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
基于PKI技术构建企业统一认证平台研究
基于PKI技术构建企业统一认证平台研究
收藏 引用
作者: 王贤鸣 复旦大学
学位级别:硕士
PKI是“Public Key Infrastructure”的缩写,意为“公钥基础设施”。简单地说,PKI技术就是利用公钥理论和技术建立的提供信息安全服务的基础设施。公钥体制是目前应用最广泛的一种加密体制,在这一体制中,加密密钥与解密密钥各不相同,发... 详细信息
来源: 同方学位论文库 同方学位论文库 评论