Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,398,550 papers from all fields of science
Search
Sign In
Create Free Account
Identity management system
Known as:
Identity management systems
, Identity system
An identity management system refers to an information system, or to a set of technologies that can be used for enterprise or cross-network identity…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
45 relations
Access control
Active Directory
Central Authentication Service
Cloud computing
Expand
Broader (1)
Identity management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Nonlinear toroidal filtering based on bivariate wrapped normal distributions
G. Kurz
,
F. Pfaff
,
U. Hanebeck
Fusion
2017
Corpus ID: 5864223
Estimation of periodic quantities such as angles or phase values is a common problem. However, standard approaches, for example…
Expand
2012
2012
A trust based model for federated identity architecture to mitigate identity theft
Eghbal Ghazizadeh
,
M. Zamani
,
J. Manan
,
R. Khaleghparast
,
A. Taherian
International Conference for Internet Technology…
2012
Corpus ID: 18880867
Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT…
Expand
2010
2010
Regulating Reproductive Technologies: Timing, Uncertainty and Donor Anonymity
G. Bernstein
2010
Corpus ID: 154908238
Two global trends have emerged in the regulation of Artificial Reproductive Technology (“ART”): the adoption of a comprehensive…
Expand
2010
2010
Issues of E-Learning Standards and Identity Management for Mobility and Collaboration in Higher Education.
P. Alves
,
J. Uhomoibhi
2010
Corpus ID: 61144288
Purpose – This paper seeks to investigate and report on the status of identity management systems and e‐learning standards across…
Expand
2009
2009
Trusted Identity for All: Toward Interoperable Trusted Identity Management Systems
P. Pacyna
,
A. Rutkowski
,
A. Sarma
,
Kenji Takahashi
Computer
2009
Corpus ID: 16403232
The ubiquitous deployment of systems for collecting, processing, and sharing personally identifiable information for service…
Expand
2007
2007
A Pattern Language for Identity Management
N. Delessy
,
E. Fernández
,
M. Larrondo-Petrie
International Multi-Conference on Computing in…
2007
Corpus ID: 14461637
The development of software has recently changed significantly. With the ubiquity of computing, users may need to access a wider…
Expand
2007
2007
Modeling cryptographic properties of voice and voice-based entity authentication
G. D. Crescenzo
,
M. Cochinwala
,
H. Shim
Digital Identity Management
2007
Corpus ID: 8206989
Strong and/or multi-factor entity authentication protocols are of crucial importancein building successful identity management…
Expand
2007
2007
Usability Enhanced Privacy Protection System Based on Users' Responses
Han-Gyu Ko
,
Seung-Hyun Kim
,
Seunghun Jin
IEEE International Symposium on Consumer…
2007
Corpus ID: 11511505
Recently, the concern and significance about the privacy protection for Internet users are increased as many incidents of privacy…
Expand
2006
2006
What user-controlled identity management should learn from communities
K. Borcea-Pfitzmann
,
M. Hansen
,
K. Liesebach
,
A. Pfitzmann
,
Sandra Steinbrecher
Information Security Technical Report
2006
Corpus ID: 16323150
1992
1992
Models of a K-Rational Identity System
D. Krob
Journal of computer and system sciences (Print)
1992
Corpus ID: 325154
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE