Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,499,982 papers from all fields of science
Search
Sign In
Create Free Account
Identity management
Known as:
Access and Identity Management
, ID management
, I&AM
Expand
In computer security, identity and access management (IAM) is the security and business discipline that "enables the right individuals to access the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Access control
Authentication
Claims-based identity
Computer security
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Blockchain-based PKI for Crowdsourced IoT Sensor Information
Guilherme Vieira Pinto
,
João Pedro Dias
,
H. Ferreira
International Conference of Soft Computing and…
2018
Corpus ID: 49667516
The Internet of Things is progressively getting broader, evolving its scope while creating new markets and adding more to the…
Expand
2016
2016
Convolutional Multi-directional Recurrent Network for Offline Handwritten Text Recognition
Zenghui Sun
,
Lianwen Jin
,
Zecheng Xie
,
Ziyong Feng
,
Shuye Zhang
International Conference on Frontiers in…
2016
Corpus ID: 32958384
In this paper, we propose a new network architecture called Convolutional Multi-directional Recurrent Network (CDRN) for offline…
Expand
Review
2007
Review
2007
Automated IT service fault diagnosis based on event correlation techniques
A. Hanemann
2007
Corpus ID: 11658513
In the previous years a paradigm shift in the area of IT service management could be witnessed. IT management does not only deal…
Expand
2006
2006
Prevention of Spam over IP Telephony (SPIT)
J. Quittek
,
S. Niccolini
,
S. Tartarelli
,
Roman Schlegel
2006
Corpus ID: 7644819
Spam over IP Telephony (SPIT) is expected to become a serious problem in the near future. It has the potential to become an even…
Expand
Review
2005
Review
2005
Phishing Attacks - A Socially Engineered Threat to e-Business
J. Arreymbi
International Conference on Internet Computing
2005
Corpus ID: 20328828
Phishing attacks are stealing consumer identities and creating major burdens on e-businesses. While one-time passwords deter…
Expand
2004
2004
Security Assessment: Case Studies for Implementing the NSA IAM
Russ Rogers
,
Greg Miles
,
Ted Dykstra
,
E. Fuller
2004
Corpus ID: 109223553
Laying the foundation for your assessment The pre-assessment visit Determining the organizations information criticality system…
Expand
2003
2003
Implementation of a test day model for production traits in the UK
R. Mrode
,
G. Swanson
,
M. Paget
2003
Corpus ID: 55110305
The Test day model (TDM) has become the method of choice for genetic evaluation of production traits in dairy cattle. Various…
Expand
1992
1992
IAA synthesis in Azospirillum brasilense Sp6: Analysis of a mutant impaired in IAM-hydrolase
A. Costacurta
,
E. Prinsen
,
H. Onckelen
,
K. Michiels
,
J. Vanderleyden
,
M. Nuti
1992
Corpus ID: 88654791
1976
1976
Continuous production ofL-malic acid by immobilizedBrevibacterium ammoniagenes cells
Kozo Yamamoto
,
T. Tosa
,
Kiyokazu Yamashita
,
I. Chibata
European Journal of Applied Microbiology and…
1976
Corpus ID: 28707432
SummaryContinuous production ofL-malic acid from fumaric acid using immobilized microbial cells was investigated. Several…
Expand
1968
1968
Identity and Identity Diffusion
E. Erikson
1968
Corpus ID: 149395822
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE