Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,258,701 papers from all fields of science
Search
Sign In
Create Free Account
Identity management system
Known as:
Identity management systems
, Identity system
An identity management system refers to an information system, or to a set of technologies that can be used for enterprise or cross-network identity…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
45 relations
Access control
Active Directory
Central Authentication Service
Cloud computing
Expand
Broader (1)
Identity management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2019
Highly Cited
2019
A Taxonomic Approach to Understanding Emerging Blockchain Identity Management Systems
Loic Lesavre
,
Priam Varin
,
P. Mell
,
Michal Davidson
,
James M. Shook
arXiv.org
2019
Corpus ID: 199015726
<jats:p />
Review
2018
Review
2018
A Survey on Blockchain-Based Identity Management Systems for the Internet of Things
Xiaoyang Zhu
,
Y. Badr
IEEE International Conference on Internet of…
2018
Corpus ID: 69824766
The Internet of Things aims at connecting everything ranging from individuals, organizations, companies to things in the physical…
Expand
2018
2018
reclaimID: Secure, Self-Sovereign Identities Using Name Systems and Attribute-Based Encryption
Martin Schanzenbach
,
Georg Bramm
,
J. Schütte
17th IEEE International Conference On Trust…
2018
Corpus ID: 21702494
In this paper we present reclaimID: An architecture that allows users to reclaim their digital identities by securely sharing…
Expand
Highly Cited
2017
Highly Cited
2017
Identity management using blockchain for cognitive cellular networks
S. Raju
,
Sai Boddepalli
,
Suraj Gampa
,
Qiben Yan
,
J. Deogun
IEEE International Conference on Communications…
2017
Corpus ID: 22724011
Cloud-centric cognitive cellular networks utilize dynamic spectrum access and opportunistic network access technologies as a…
Expand
2010
2010
Collaborative privacy management
Jan Kolter
,
Thomas Kernchen
,
G. Pernul
Computers & security
2010
Corpus ID: 26640198
Highly Cited
2009
Highly Cited
2009
Legal safeguards for privacy and data protection in ambient intelligence
P. Hert
,
S. Gutwirth
,
Anna Moscibroda
,
David Wright
,
G. G. Fuster
Personal and Ubiquitous Computing
2009
Corpus ID: 1617571
To get the maximum benefit from ambient intelligence (AmI), we need to anticipate and react to possible drawbacks and threats…
Expand
Highly Cited
2008
Highly Cited
2008
Privacy and Identity Management
M. Hansen
,
Ari Schwartz
,
Alissa Cooper
IEEE Security and Privacy
2008
Corpus ID: 376632
Creating and managing individual identities is a central challenge of the digital age. As identity management systems defined…
Expand
Highly Cited
2007
Highly Cited
2007
Authentic Leadership : A Self , Leader , and Spiritual Identity Perspective
Karin Klenke
2007
Corpus ID: 36821294
In this paper, I introduce a model of authentic leadership that rests on a single explanatory concept— identity—which specifies…
Expand
Highly Cited
2004
Highly Cited
2004
Privacy-enhancing identity management
M. Hansen
,
P. Berlich
,
J. Camenisch
,
Sebastian Clauss
,
A. Pfitzmann
,
M. Waidner
Information Security Technical Report
2004
Corpus ID: 5236716
Highly Cited
1976
Highly Cited
1976
Implementation of the digital phase vocoder using the fast Fourier transform
M. Portnoff
1976
Corpus ID: 62598676
This paper discusses a digital formulation of the phase vocoder, an analysis-synthesis system providing a parametric…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE