Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 229,973,201 papers from all fields of science
Search
Sign In
Create Free Account
Credential
Known as:
Credentials
A credential is an attestation of qualification, competence, or authority issued to an individuated by a third party with a relevant or de facto…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
36 relations
Access control
Android Privacy Guard
Atomic authorization
Biometrics
Expand
Broader (1)
Identity management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Forensic Taxonomy of Popular Android mHealth Apps
Abdullah Azfar
,
Kim-Kwang Raymond Choo
,
Lin Liu
Americas Conference on Information Systems
2015
Corpus ID: 12002296
Mobile health applications (or mHealth apps, as they are commonly known) are increasingly popular with both individual end users…
Expand
2012
2012
CSI: Compressed sensing-based clone identification in sensor networks
Chia-Mu Yu
,
Chun-Shien Lu
,
S. Kuo
IEEE International Conference on Pervasive…
2012
Corpus ID: 9093547
The clone detection, aiming to detect the illegal copies with all of the credentials of legitimate sensor nodes, is of great…
Expand
Highly Cited
2011
Highly Cited
2011
Pico: No More Passwords!
F. Stajano
Security Protocols Workshop
2011
Corpus ID: 16190648
From a usability viewpoint, passwords and PINs have reached the end of their useful life. Even though they are convenient for…
Expand
2007
2007
Access Control Policies and Languages in Open Environments
S. Vimercati
,
S. Foresti
,
S. Jajodia
,
P. Samarati
Secure Data Management in Decentralized Systems
2007
Corpus ID: 14478617
Access control is the process of mediating every request to resources and data maintained by a system and determining whether the…
Expand
Highly Cited
2006
Highly Cited
2006
Models of Success Versus the Success of Models: Reliability without Truth
Eric Winsberg
Synthese
2006
Corpus ID: 18275928
In computer simulations of physical systems, the construction of models is guided, but not determined, by theory. At the same…
Expand
Highly Cited
2006
Highly Cited
2006
Access control enforcement for conversation-based web services
Massimo Mecella
,
M. Ouzzani
,
F. Paci
,
E. Bertino
The Web Conference
2006
Corpus ID: 8884442
Service Oriented Computing is emerging as the main approach to build distributed enterprise applications on the Web. The…
Expand
2005
2005
Redressing the democratic deficit in treaty law making: (Re-) establishing a role for Parliament
J. Harrington
2005
Corpus ID: 158377301
Highly Cited
2004
Highly Cited
2004
Evaluation of Korean food waste composting with fed-batch operations I: using water extractable total organic carbon contents (TOCw)
Sung-hwan Kwon
,
D. H. Lee
2004
Corpus ID: 53129672
Highly Cited
2000
Highly Cited
2000
A security architecture for mobile agents in Ajanta
Neeran M. Karnik
,
A. Tripathi
Proceedings 20th IEEE International Conference on…
2000
Corpus ID: 30219771
A mobile agent represents a computation that can autonomously migrate in a network to perform tasks on behalf of its creator…
Expand
Highly Cited
1997
Highly Cited
1997
A mind is a wonderful thing to waste: “think like a commodity”, become a CPA
T. Tinker
,
Athina Koutsoumadi
1997
Corpus ID: 15130380
Technical excess in accounting education has always been a source of discontent among educational reformers, however, two recent…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE