Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,148,088 papers from all fields of science
Search
Sign In
Create Free Account
Credential
Known as:
Credentials
A credential is an attestation of qualification, competence, or authority issued to an individuated by a third party with a relevant or de facto…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
36 relations
Access control
Android Privacy Guard
Atomic authorization
Biometrics
Expand
Broader (1)
Identity management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
CSI: Compressed sensing-based clone identification in sensor networks
Chia-Mu Yu
,
Chun-Shien Lu
,
S. Kuo
IEEE International Conference on Pervasive…
2012
Corpus ID: 9093547
The clone detection, aiming to detect the illegal copies with all of the credentials of legitimate sensor nodes, is of great…
Expand
2007
2007
Access Control Policies and Languages in Open Environments
S. Vimercati
,
S. Foresti
,
S. Jajodia
,
P. Samarati
Secure Data Management in Decentralized Systems
2007
Corpus ID: 14478617
Access control is the process of mediating every request to resources and data maintained by a system and determining whether the…
Expand
Highly Cited
2006
Highly Cited
2006
Models of Success Versus the Success of Models: Reliability without Truth
Eric Winsberg
Synthese
2006
Corpus ID: 18275928
In computer simulations of physical systems, the construction of models is guided, but not determined, by theory. At the same…
Expand
Highly Cited
2006
Highly Cited
2006
Access control enforcement for conversation-based web services
Massimo Mecella
,
M. Ouzzani
,
F. Paci
,
E. Bertino
The Web Conference
2006
Corpus ID: 8884442
Service Oriented Computing is emerging as the main approach to build distributed enterprise applications on the Web. The…
Expand
2005
2005
Redressing the democratic deficit in treaty law making: (Re-) establishing a role for Parliament
J. Harrington
2005
Corpus ID: 158377301
Highly Cited
2000
Highly Cited
2000
A security architecture for mobile agents in Ajanta
Neeran M. Karnik
,
A. Tripathi
Proceedings 20th IEEE International Conference on…
2000
Corpus ID: 30219771
A mobile agent represents a computation that can autonomously migrate in a network to perform tasks on behalf of its creator…
Expand
Highly Cited
2000
Highly Cited
2000
Security enhanced mobile agents
V. Varadharajan
Conference on Computer and Communications…
2000
Corpus ID: 5606711
This paper describes a security model for mobile agent based systems. The model defines the notion of a security-enhanced agent…
Expand
Highly Cited
1997
Highly Cited
1997
A mind is a wonderful thing to waste: “think like a commodity”, become a CPA
T. Tinker
,
Athina Koutsoumadi
1997
Corpus ID: 15130380
Technical excess in accounting education has always been a source of discontent among educational reformers, however, two recent…
Expand
Highly Cited
1985
Highly Cited
1985
Primary sensory projections from the labella to the brain of Drosophila melanogaster Meigen (Diptera : Drosophilidae)
Shubha V. Nayak
,
R. N. Singh
1985
Corpus ID: 85220006
1984
1984
The distribution and sources of archaeological pitchstone in Britain
O. W. Thorpe
,
R. Thorpe
1984
Corpus ID: 53123683
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required