Automating identity management and access control

被引:0
|
作者
TNO Information and Communication Technology, P.O. Box 1416, Groningen [1 ]
9701 BK, Netherlands
不详 [2 ]
6401 DL, Netherlands
不详 [3 ]
3430 JC, Netherlands
机构
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:235 / 243
相关论文
共 50 条
  • [1] Automating Identity Management and Access Control
    Joosten, Rieks
    Joosten, Stef
    FUTURE OF IDENTITY IN THE INFORMATION SOCIETY, 2008, : 235 - +
  • [2] Tutorial: Identity Management Systems and Secured Access Control
    Hovav, Anat
    Berger, Ron
    COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2009, 25 : 531 - 570
  • [3] Efficient Identity Management and Access Control in Cloud Environment
    Gloster, Jonathan
    CYBER SENSING 2013, 2013, 8757
  • [4] Tutorial: Identity management systems and secured access control
    Hovav, Anat
    Berger, Ron
    Communications of the Association for Information Systems, 2009, 25 (01): : 531 - 570
  • [5] AI/ML, Graphs and Access Control: Towards Holistic Identity and Access Management
    Kundu, Ashish
    PROCEEDINGS OF THE 29TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2024, 2024, : 1 - 1
  • [6] Blockchain aware decentralized identity management and access control system
    Agarkar, Aarti Amod
    Karyakarte, Mandar
    Chavhan, Gajanan
    Patil, Milind
    Talware, Rajendra
    Kulkarni, Lalit
    Measurement: Sensors, 2024, 31
  • [7] A Role and Activity Based Access Control Model for University Identity and Access Management System
    Zheng, Shuliang
    Jiang, Dongxing
    Liu, Qixin
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 487 - 490
  • [8] Automating the Detection of Access Control Vulnerabilities in Web Applications
    Rennhard M.
    Kushnir M.
    Favre O.
    Esposito D.
    Zahnd V.
    SN Computer Science, 3 (5)
  • [9] NAC: Automating Access Control via Named Data
    Zhang, Zhiyi
    Yu, Yingdi
    Ramani, Sanjeev Kaushik
    Afanasyev, Alex
    Zhang, Lixia
    2018 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2018), 2018, : 619 - 626
  • [10] Automating Security Configuration and Administration: An Access Control Perspective
    Vaidya, Jaideep
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, 2010, 6434 : 1 - 9