Search results
Create the page "Identity management" on this wiki! See also the search results found.
- 9) Memory management, smart caches and compiler controlled memories efforts to conceal their identity. Submissions not adhering to these11 KB (1,352 words) - 00:33, 15 October 2008
- * Tools and Methodologies for Large Scale Semantic Web Data - Management * Semantic Web-based Knowledge Management4 KB (573 words) - 23:31, 14 October 2008
- * Memory management ...please provide that information to the PC chair separately. Note that the identity of the authors will be revealed to the reviewers once the review is submitt5 KB (678 words) - 20:58, 26 November 2016
- ...l or distributed simulation, including synchronization, scheduling, memory management, and load balancing. ...submissions will be reviewed using a double-blind review process,i.e., the identity of authors, and referees will not be revealed to each other. To ensure blin3 KB (372 words) - 23:32, 14 October 2008
- Service marketing and customer relationship management Knowledge modeling, management, and application8 KB (1,075 words) - 23:52, 14 October 2008
- | Field = Management ...expanding field by focusing on issues relevant to electronic business and management. Academics and practitioners are invited to submit conceptually and empiric3 KB (391 words) - 23:36, 14 October 2008
- risk management, collaborative filtering, social/business networking * Trust management, reputation management and identity management4 KB (499 words) - 23:42, 14 October 2008
- * SECMAN: Security management ...onse planning; Intrusion detection and event correlation; Firewalls; Trust management; Software security assurance13 KB (1,617 words) - 19:03, 24 November 2008
- * Distributed Access Control and Trust Management * Identity Management and Authentication12 KB (1,669 words) - 12:58, 18 January 2009
- - Organisational Design and Management - Identity6 KB (860 words) - 13:00, 18 January 2009
- * Mashups and federated identity * Mashups for corporate knowledge management6 KB (684 words) - 13:00, 18 January 2009
- management of customers? data in Web stores can help building trust by - Trust management frameworks for secure collaborations5 KB (602 words) - 13:44, 23 January 2009
- * Authentication and identity management in UE * Risk assessment, and management in UE6 KB (793 words) - 15:12, 1 October 2020
- - Identity management - Key management and authentication6 KB (852 words) - 13:02, 18 January 2009
- - Digital Rights Management - Identity and Trust Management8 KB (967 words) - 17:07, 27 February 2009
- | Title = 2009 World Congress on Privacy, Security, Trust and the Management of e-Business 2009 World Congress on Privacy, Security, Trust and the Management of e-Business12 KB (1,690 words) - 17:08, 27 February 2009
- ...current network architectures and the Internet, autonomous and spontaneous management will be a key feature of future networks and information systems. In this c * Identity management3 KB (480 words) - 17:08, 27 February 2009
- - digital right management - transaction management6 KB (828 words) - 17:08, 27 February 2009
- - QoS management in WMS - Authentication, identity management in WMS3 KB (477 words) - 16:54, 8 August 2009
- ...onse planning; Intrusion detection and event correlation; Firewalls; Trust management; Software security assurance ...e protocols; Applied cryptography; Smart cards; Biometrics; Digital rights management; Electronic surveillance; Database security6 KB (746 words) - 11:35, 2 August 2009
- ...erification; Performance on firewall protected real-time systems; Security management in real-time systems; Metrics and techniques for security risk assessment; ...methodologies and ID Cards; Security on hardware and smart cards; Identity management; Automated security analysis; Electronic Privacy; Anonymity and pseudo-anon14 KB (1,651 words) - 15:56, 15 February 2017
- Identity Management, Security and Trust Management in P2P and Grid applications,3 KB (352 words) - 12:39, 11 August 2009
- -Implementation, deployment and management of network security policies ...ection: protocols, implementations, metering, watermarking, digital rights management6 KB (766 words) - 10:54, 26 April 2010
- * Digital Rights Management * Identity and Trust management4 KB (484 words) - 14:20, 14 December 2009
- - Enterprise management and consumer protection - Identity and Trust Management7 KB (982 words) - 19:13, 3 January 2010
- - QoS management in WMS - Authentication, identity management in WMS3 KB (497 words) - 03:43, 28 February 2010
- * Formal relations: parthood, identity, connection, dependence, constitution, subsumption, instantiation * Identity and change4 KB (551 words) - 14:54, 27 December 2015
- * › Knowledge Management * › e-Procurement and Web-based Supply Chain Management19 KB (2,462 words) - 19:10, 26 August 2010
- - identity management, anonymity5 KB (701 words) - 05:52, 14 April 2011
- Identity Management Security and Trust Management in P2P and Grid applications5 KB (597 words) - 10:45, 21 August 2020
- |Title=International Workshop on Visualization and Information Security Management |Field=Security Management3 KB (468 words) - 00:17, 2 March 2011
- Identity Management Information Security Management3 KB (368 words) - 16:16, 29 February 2012
- ...Management of non-unique physical cell identities, IP address and VLAN ID management. ...ation; Node load balancing, Tracking area optimization, Quality of Service Management, Transport Path Optimization, Green approaches and energy efficiency mechan5 KB (633 words) - 14:08, 2 March 2012
- ...Web-based communication services; Node localizations; Indoor positioning; Management plane; Community structure detection; Preventing DDoS attacks; Multifactor ...n of network functions; Software defined networking (SDN) and 5G; Mobility management, energy efficiency, power cost reduction in 5G networks; Network function v13 KB (1,580 words) - 19:35, 18 February 2021
- ...manifold, including an unprecedented flexibility for network operation and management, and a favorable environment for delivering innovative network applications ...us security aspects of next-generation networking technologies and service management frameworks.4 KB (581 words) - 18:48, 24 February 2020
- ...as include conceptual modeling, database design, knowledge engineering and management, software engineering, organizational modeling, artificial intelligence, ro * Formal relations: parthood, identity, connection, dependence, constitution, causality, subsumption, instantiatio6 KB (751 words) - 14:08, 22 February 2020
- *Business Process Management ...tion of the paper and any other reference that may disclose the authors’ identity.7 KB (938 words) - 11:06, 6 September 2020
- |Field=Research of Data Management Theory ...prestigious forum for the exchange of the latest research results in data management. Held in an attractive European location, the conference provides unique op5 KB (580 words) - 13:29, 4 February 2019
- ...al issues arises out of this. What impact does this have on the self whose identity in the time/space continuum, in the rapidly changing environment, and in th Business and Management Ethics4 KB (563 words) - 11:14, 17 September 2020
- ...ost prominently the Model-Driven Architecture (MDA) fostered by the Object Management Group (OMG). In the scope of MDA, a couple of technologies have been develo Workflow Management Systems8 KB (1,165 words) - 17:11, 18 July 2012
- Special Theme: "Connectedness, Identity and Alienation in the Arts and Humanities" ...suggestion of an optional themes to concentrate the mind; "Connectedness, Identity and Alienation in the Arts and Humanities", and the organizers encourage su3 KB (351 words) - 11:10, 17 September 2020
- Economics and Management Ethnicity, Difference, Identity2 KB (291 words) - 19:26, 2 March 2021
- • Ecological management • Social identity6 KB (728 words) - 01:01, 25 August 2012
- Special Theme: "Connectedness, Identity and Alienation in the Arts and Humanities" The conference theme is "Connectedness, Identity and Alienation in the Arts and Humanities", and the organizers encourage su2 KB (289 words) - 09:59, 4 March 2013
- Economics and Management Ethnicity, Difference, Identity3 KB (402 words) - 10:00, 4 March 2013
- * Enterprise Security Management * Identity Management2 KB (264 words) - 15:32, 7 January 2021
- ...es and affiliations. Furthermore, self-references that reveal the author's identity, e.g., "We previously showed (Smith, 1991) ..." must be avoided. Instead, u Submission is electronic, using the Softconf START conference management system at10 KB (1,480 words) - 23:28, 13 December 2017
- |Field=technology, biometrics, identity management, security467 bytes (59 words) - 13:50, 25 September 2016
- |Title=Detection, Representation and Management of Concept Drift in Linked Open Data Drift-a-LOD2017: Detection, Representation and Management of Concept Drift in Linked Open Data4 KB (531 words) - 12:59, 8 July 2017
- * Data Management and Knowledge Representation ...tion of the paper and any other reference that may disclose the authors’ identity.5 KB (615 words) - 10:58, 15 May 2020