...sources and Evaluation for Identity Matching, Entity Resolution and Entity Management
...sources and Evaluation for Identity Matching, Entity Resolution and Entity Management
...
3 KB (369 words) - 21:08, 14 October 2008
|Title=21st European Conference on Knowledge Management
* The fundamentals of Knowledge Management
...
1 KB (136 words) - 18:49, 13 May 2020
Identity-Based Cryptography
Identity Management
...
2 KB (169 words) - 08:42, 25 August 2020
|Field=technology, biometrics, identity management, security
...
467 bytes (59 words) - 11:50, 25 September 2016
| Title = Joint iTrust and PST Conferences on Privacy, Trust Management and Security
...ual meeting and conference of the newly formed IFIP Working Group on Trust Management (IFIP WG 11.11). IFIPTM 2007 provided a truly global platform for the repor
...
4 KB (565 words) - 21:20, 14 October 2008
Special Theme: "Connectedness, Identity and Alienation in the Arts and Humanities"
The conference theme is "Connectedness, Identity and Alienation in the Arts and Humanities", and the organizers encourage su
...
2 KB (289 words) - 07:59, 4 March 2013
Identity management
Key management
...
1 KB (188 words) - 02:26, 13 April 2021
...uting, we encourage contributions on policy-based techniques in support of management and security of all types of wireless networks: cellular, Wi-Fi, Mobile Ad
...008 invites unpublished novel contributions on all aspects of policy-based management. This year, as part of the technical program we also plan a special session
...
5 KB (667 words) - 21:13, 14 October 2008
-Implementation, deployment and management of network security policies
...ection: protocols, implementations, metering, watermarking, digital rights management
...
6 KB (766 words) - 08:54, 26 April 2010
|Title=International Workshop on Visualization and Information Security Management
|Field=Security Management
...
3 KB (468 words) - 22:17, 1 March 2011
...including traditional database management, as well new challenges for data management in any possible domain. Prospective authors are encouraged to consider nove
§ Transactions and Workflow Management
...
3 KB (305 words) - 06:44, 31 July 2020
* • Identity Management
* • Trust Management
...
2 KB (197 words) - 15:40, 11 February 2021
|Title=IJSPTM 2017 : International Journal of Security, Privacy and Trust Management
INTERNATIONAL JOURNAL OF SECURITY, PRIVACY AND TRUST MANAGEMENT (IJSPTM)
...
5 KB (640 words) - 11:34, 28 July 2017
* Enterprise Security Management
* Identity Management
...
2 KB (264 words) - 13:32, 7 January 2021
* Digital Rights Management
* Identity and Trust management
...
4 KB (484 words) - 12:20, 14 December 2009
risk management, collaborative filtering, social/business networking
* Trust management, reputation management and identity management
...
4 KB (499 words) - 21:42, 14 October 2008
| Field = Management
...expanding field by focusing on issues relevant to electronic business and management. Academics and practitioners are invited to submit conceptually and empiric
...
3 KB (391 words) - 21:36, 14 October 2008
Special Theme: "Connectedness, Identity and Alienation in the Arts and Humanities"
...suggestion of an optional themes to concentrate the mind; "Connectedness, Identity and Alienation in the Arts and Humanities", and the organizers encourage su
...
3 KB (351 words) - 09:10, 17 September 2020
Mobility management and Handover
Resource allocation management
...
4 KB (502 words) - 21:20, 14 October 2008
...onse planning; Intrusion detection and event correlation; Firewalls; Trust management; Software security assurance
...e protocols; Applied cryptography; Smart cards; Biometrics; Digital rights management; Electronic surveillance; Database security
...
6 KB (746 words) - 09:35, 2 August 2009