Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,690,890 papers from all fields of science
Search
Sign In
Create Free Account
Identity management
Known as:
Access and Identity Management
, ID management
, I&AM
Expand
In computer security, identity and access management (IAM) is the security and business discipline that "enables the right individuals to access the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Access control
Authentication
Claims-based identity
Computer security
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Security and privacy mechanism for health internet of things
Kai Kang
,
Zhibo Pang
,
Cong Wang
2013
Corpus ID: 62630306
2013
2013
Improving HMM-Based Keyword Spotting with Character Language Models
Andreas Fischer
,
Volkmar Frinken
,
H. Bunke
,
C. Suen
IEEE International Conference on Document…
2013
Corpus ID: 17143689
Facing high error rates and slow recognition speed for full text transcription of unconstrained handwriting images, keyword…
Expand
2011
2011
A provisioning model towards OAuth 2.0 performance optimization
Moustafa Noureddine
,
R. Bashroush
International Conference on Computational…
2011
Corpus ID: 14220645
A major hurdle of formal adoption of OAuth protocol for enterprise applications is performance. Enterprise applications (e.g. SAP…
Expand
2010
2010
A Novel Word Spotting Algorithm Using Bidirectional Long Short-Term Memory Neural Networks
Volkmar Frinken
,
Andreas Fischer
,
H. Bunke
IAPR International Workshop on Artificial Neural…
2010
Corpus ID: 40598353
Keyword spotting refers to the process of retrieving all instances of a given key word in a document. In the present paper, a…
Expand
Review
2010
Review
2010
Molecular hosts for triplet emitters in organic light-emitting diodes and the corresponding working principle
B. Mi
,
Zhiqiang Gao
,
Zhangjin Liao
,
Wei Huang
,
Chin H. Chen
2010
Corpus ID: 55100255
This paper summarizes the mechanism and routes for excitation of triplet emitters in dopant emission based phosphorescent organic…
Expand
2009
2009
Simple and effective techniques for core-region detection and slant correction in offline script recognition
A. Rehman
,
Dzulkifli Mohammad
,
G. Sulong
,
T. Saba
IEEE International Conference on Signal and Image…
2009
Corpus ID: 14498902
This paper presents two new preprocessing techniques for cursive script recognition. Enhanced algorithms for core-region…
Expand
2007
2007
A Semantic Framework for Integrated Asset Management in Smart Oilfields
R. Soma
,
A. Bakshi
,
V. Prasanna
IEEE/ACM International Symposium on Cluster…
2007
Corpus ID: 2752639
Integrated asset management (IAM) is the vision of IT- enabled transformation of oilfield operations where information…
Expand
2004
2004
Inference Methods for Autonomous Stochastic Linear Hybrid Systems
H. Balakrishnan
,
Inseok Hwang
,
J. Jang
,
C. Tomlin
International Conference on Hybrid Systems…
2004
Corpus ID: 11657310
We present a parameter inference algorithm for autonomous stochastic linear hybrid systems, which computes a maximum-likelihood…
Expand
1986
1986
Intra- and Intergeneric Similarities of the Ribosomal Ribonucleic Acid Cistrons of Acinetobacter
A. Landschoot
,
R. Rossau
,
J. Ley
1986
Corpus ID: 55315179
3H-labeled rRNA was prepared from Acinetobacter calcoaceticus ATCC 23055Tand hybridized with filter-fixed DNA from carefully…
Expand
1968
1968
Identity and Identity Diffusion
E. Erikson
1968
Corpus ID: 149395822
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE