Bcheri et al., 2012 - Google Patents
D6. 1 application description for the school deploymentBcheri et al., 2012
View PDF- Document ID
- 8989631806264582258
- Author
- Bcheri S
- Goetze N
- Orski M
- Zwingelberg H
- Publication year
External Links
Snippet
D6.1 Application Description for the school deployment Page 1 Attribute-Based Credentials for
Trust The research leading to these results has received funding from the European
Community’s Seventh Framework Programme (FP7/2007-2013) under grant agreement n …
- 210000001747 Pupil 0 abstract description 116
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/105—Human resources
- G06Q10/1053—Employment or hiring
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10110584B1 (en) | Elevating trust in user identity during RESTful authentication and authorization | |
US8613051B2 (en) | System and method for COPPA compliance for online education | |
Chadwick et al. | Leveraging social networks to gain access to organisational resources | |
Hovav et al. | Tutorial: identity management systems and secured access control | |
Bcheri et al. | D6. 1 application description for the school deployment | |
Liagkou et al. | Privacy preserving course evaluations in Greek higher education institutes: an e-Participation case study with the empowerment of Attribute Based Credentials | |
Westfall et al. | Locking the virtual filing cabinet: A researcher's guide to Internet data security | |
Yan | Self-sovereign identity based personal information security control infrastructure-A case study of E-portfolio ecosystem | |
Campos et al. | Leveraging identity management interoperability in ehealth | |
Bcheri et al. | D5. 1 scenario definition for both pilots | |
Diogenes et al. | Exam Ref AZ-500 Microsoft Azure Security Technologies | |
Coats et al. | Achieving electronic health record access from the cloud | |
Lutaaya | Me, Myself, and ID: Towards Usable, Privacy-Preserving, Fraud-Resistant Digital Identity Services for Smartphone Users | |
Sabouri et al. | Privacy-Respecting School Community Interaction Platform | |
Mitchell | Security concerns in accessing naval e-learning with personal mobile devices | |
Jensen | Federated Identity Management in the Norwegian Oil and Gas Industry | |
Samsudin et al. | TIKAS: Kindergarten Attendance Application with Role-Based Access Control for Tadika Inovasi Kreatif | |
Linden | Organisational and cross-organisational identity management. | |
Dobias et al. | Identity and privacy issues throughout life | |
Scholl et al. | Draft security architecture design process for health information exchanges (HIEs) | |
Ouko | Identity management and user authentication approach for the implementation of bring your own device in organizations | |
Murray | A Secure and Strategic Approach to Keep IoT Devices Safe from Malware Attack | |
Responders | Mobile Application Single Sign-On | |
CAMERONI | Providing Login and Wi-Fi Access Services With the eIDAS Network: A Practical Approach | |
Obote | Identity and authentication Model for Bring your own Device in Organizations |