Skip to search formSkip to main contentSkip to account menu

Identity management

Known as: Access and Identity Management, ID management, I&AM 
In computer security, identity and access management (IAM) is the security and business discipline that "enables the right individuals to access the… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
One of the most profound changes today is the increase in mobility of portable yet powerful wireless devices capable of… 
Highly Cited
2009
Highly Cited
2009
This paper describes a social network site designed to support employees within an enterprise in connecting and learning about… 
Highly Cited
2008
Highly Cited
2008
In this paper, OFDM/OQAM is proposed as an alternative to conventional OFDM with cyclic prefix (CP) for transmission over multi… 
Highly Cited
2001
Highly Cited
2001
This paper tries to serve as an introductory reading to privacy issues in the field of ubiquitous computing. It develops six… 
Review
1997
Review
1997
The ® rst part of this paper proposes a continuum of ideological premises that seeks to account for the broad range of immigrant… 
Review
1997
Review
1997
One of the principal tools used in the integrated assessment (IA) of environmental science, technology and policy problems is…