Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,031,196 papers from all fields of science
Search
Sign In
Create Free Account
Identity management
Known as:
Access and Identity Management
, ID management
, I&AM
Expand
In computer security, identity and access management (IAM) is the security and business discipline that "enables the right individuals to access the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Access control
Authentication
Claims-based identity
Computer security
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2014
Review
2014
A review of biometric technology along with trends and prospects
J. Unar
,
Woo Chaw Seng
,
A. Abbasi
Pattern Recognition
2014
Corpus ID: 29477517
Highly Cited
2012
Highly Cited
2012
Lexicon-free handwritten word spotting using character HMMs
Andreas Fischer
,
Andreas Keller
,
Volkmar Frinken
,
H. Bunke
Pattern Recognition Letters
2012
Corpus ID: 12811834
Highly Cited
2010
Highly Cited
2010
Identity Management Framework towards Internet of Things (IoT): Roadmap and Key Challenges
P. Mahalle
,
S. Babar
,
N. Prasad
,
R. Prasad
Conference on Network Security & Applications
2010
Corpus ID: 30744498
One of the most profound changes today is the increase in mobility of portable yet powerful wireless devices capable of…
Expand
Highly Cited
2009
Highly Cited
2009
People Sensemaking and Relationship Building on an Enterprise Social Network Site
J. DiMicco
,
Werner Geyer
,
D. Millen
,
Casey Dugan
,
Beth Brownholtz
Hawaii International Conference on System…
2009
Corpus ID: 17756702
This paper describes a social network site designed to support employees within an enterprise in connecting and learning about…
Expand
Highly Cited
2008
Highly Cited
2008
Channel estimation methods for preamble-based OFDM/OQAM modulations
C. Lélé
,
Jean-Philippe Javaudin
,
R. Legouable
,
Alexandre Skrzypczak
,
P. Siohan
Transactions on Emerging Telecommunications…
2008
Corpus ID: 18902093
In this paper, OFDM/OQAM is proposed as an alternative to conventional OFDM with cyclic prefix (CP) for transmission over multi…
Expand
Highly Cited
2003
Highly Cited
2003
Integrated assessment and modelling: features, principles and examples for catchment management
A. Jakeman
,
R. Kelly
Environmental Modelling & Software
2003
Corpus ID: 15665990
Review
2002
Review
2002
Progress in integrated assessment and modelling
P. Parker
,
R. Kelly
,
+7 authors
M. Janssen
Environmental Modelling & Software
2002
Corpus ID: 8654904
Highly Cited
2001
Highly Cited
2001
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
Marc Langheinrich
Ubiquitous Computing
2001
Corpus ID: 1069784
This paper tries to serve as an introductory reading to privacy issues in the field of ubiquitous computing. It develops six…
Expand
Review
1997
Review
1997
Towards an Interactive Acculturation Model: A Social Psychological Approach
Richard Y. Bourhis Lena Celine Moise Stepha
1997
Corpus ID: 55866478
The ® rst part of this paper proposes a continuum of ideological premises that seeks to account for the broad range of immigrant…
Expand
Review
1997
Review
1997
Integrated assessment modeling of global climate change: Transparent rational tool for policy making or opaque screen hiding value‐laden assumptions?
S. Schneider
1997
Corpus ID: 153254611
One of the principal tools used in the integrated assessment (IA) of environmental science, technology and policy problems is…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE