Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 219,937,489 papers from all fields of science
Search
Sign In
Create Free Account
Credential
Known as:
Credentials
A credential is an attestation of qualification, competence, or authority issued to an individuated by a third party with a relevant or de facto…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
36 relations
Access control
Android Privacy Guard
Atomic authorization
Biometrics
Expand
Broader (1)
Identity management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
AmazonIA: when elasticity snaps back
Sven Bugiel
,
S. Nürnberger
,
T. Pöppelmann
,
A. Sadeghi
,
T. Schneider
Conference on Computer and Communications…
2011
Corpus ID: 14314187
Cloud Computing is an emerging technology promising new business opportunities and easy deployment of web services. Much has been…
Expand
Highly Cited
2009
Highly Cited
2009
Online Versus In-Class Courses: An Examination of Differences in Learning Outcomes
Lisa Kirtman
2009
Corpus ID: 51851350
There has been a steady increase in the number of students taking online courses. It was estimated that there were “3,077,000…
Expand
Review
2008
Review
2008
Studying Malicious Websites and the Underground Economy on the Chinese Web
Jianwei Zhuge
,
Thorsten Holz
,
Chengyu Song
,
Jinpeng Guo
,
Xinhui Han
,
Wei Zou
Workshop on the Economics of Information Security
2008
Corpus ID: 2509871
The World Wide Web gains more and more popularity within China with more than 1.31 million websites on the Chinese Web in June…
Expand
Review
2004
Review
2004
Seeking Equity in the Education of California's English Learners
R. Rumberger
,
Patricia Gándara
Teachers College Record
2004
Corpus ID: 3558283
The article provides an abridged version of a report prepared for the lawsuit, Williams v. State of California. The report first…
Expand
Highly Cited
2003
Highly Cited
2003
The future of hydrogen fueling systems for transportation: An application of perspective-based scenario analysis using the analytic hierarchy process
J. Winebrake
,
Brian P Creswick
2003
Corpus ID: 53137122
Highly Cited
2000
Highly Cited
2000
Toward a novel metal-based chemotherapy against tropical diseases.
M. Navarro
,
T. Lehmann
,
+4 authors
J. Urbina
2000
Corpus ID: 96587463
Review
1998
Review
1998
Mobile agents and security
M. S. Greenberg
,
J. C. Byington
,
D. Harper
IEEE Communications Magazine
1998
Corpus ID: 57048010
The practicality of mobile agents hinges on realistic security techniques. Mobile agent systems are combination client/servers…
Expand
Highly Cited
1998
Highly Cited
1998
Legitimacy and the Limits of Nationalism: China and the Diaoyu Islands
E. Downs
,
Phillip C. Saunders
International Security
1998
Corpus ID: 57562150
Influenced by the resurgence of nationalism in the post-Cold War era, international relations scholars have produced a…
Expand
Highly Cited
1997
Highly Cited
1997
Aglets: Programming Mobile Agents in Java
D. Lange
,
M. Oshima
,
G. Karjoth
,
Kazuya Kosaka
Worldwide Computing and Its Applications
1997
Corpus ID: 8656829
Mobile agents are programs that can be dispatched from one computer and delivered to a remote computer for execution. Arriving at…
Expand
Highly Cited
1996
Highly Cited
1996
Audience and Voice in Current L1 Composition Texts: Some Implications for ESL Student Writers.
V. Ramanathan
,
R. Kaplan
1996
Corpus ID: 53142127
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE