Skip to search formSkip to main contentSkip to account menu

Identity management

Known as: Access and Identity Management, ID management, I&AM 
In computer security, identity and access management (IAM) is the security and business discipline that "enables the right individuals to access the… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
The Internet of Things is progressively getting broader, evolving its scope while creating new markets and adding more to the… 
2016
2016
In this paper, we propose a new network architecture called Convolutional Multi-directional Recurrent Network (CDRN) for offline… 
Review
2007
Review
2007
In the previous years a paradigm shift in the area of IT service management could be witnessed. IT management does not only deal… 
2006
2006
Spam over IP Telephony (SPIT) is expected to become a serious problem in the near future. It has the potential to become an even… 
Review
2005
Review
2005
Phishing attacks are stealing consumer identities and creating major burdens on e-businesses. While one-time passwords deter… 
2004
2004
Laying the foundation for your assessment The pre-assessment visit Determining the organizations information criticality system… 
2003
2003
The Test day model (TDM) has become the method of choice for genetic evaluation of production traits in dairy cattle. Various… 
1976
1976
SummaryContinuous production ofL-malic acid from fumaric acid using immobilized microbial cells was investigated. Several… 
1968
1968