[go: up one dir, main page]

Bcheri et al., 2012 - Google Patents

D6. 1 application description for the school deployment

Bcheri et al., 2012

View PDF
Document ID
8989631806264582258
Author
Bcheri S
Goetze N
Orski M
Zwingelberg H
Publication year

External Links

Snippet

D6.1 Application Description for the school deployment Page 1 Attribute-Based Credentials for Trust The research leading to these results has received funding from the European Community’s Seventh Framework Programme (FP7/2007-2013) under grant agreement n …
Continue reading at cordis.europa.eu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • G06Q10/105Human resources
    • G06Q10/1053Employment or hiring

Similar Documents

Publication Publication Date Title
US10110584B1 (en) Elevating trust in user identity during RESTful authentication and authorization
US8613051B2 (en) System and method for COPPA compliance for online education
Chadwick et al. Leveraging social networks to gain access to organisational resources
Hovav et al. Tutorial: identity management systems and secured access control
Bcheri et al. D6. 1 application description for the school deployment
Liagkou et al. Privacy preserving course evaluations in Greek higher education institutes: an e-Participation case study with the empowerment of Attribute Based Credentials
Westfall et al. Locking the virtual filing cabinet: A researcher's guide to Internet data security
Yan Self-sovereign identity based personal information security control infrastructure-A case study of E-portfolio ecosystem
Campos et al. Leveraging identity management interoperability in ehealth
Bcheri et al. D5. 1 scenario definition for both pilots
Diogenes et al. Exam Ref AZ-500 Microsoft Azure Security Technologies
Coats et al. Achieving electronic health record access from the cloud
Lutaaya Me, Myself, and ID: Towards Usable, Privacy-Preserving, Fraud-Resistant Digital Identity Services for Smartphone Users
Sabouri et al. Privacy-Respecting School Community Interaction Platform
Mitchell Security concerns in accessing naval e-learning with personal mobile devices
Jensen Federated Identity Management in the Norwegian Oil and Gas Industry
Samsudin et al. TIKAS: Kindergarten Attendance Application with Role-Based Access Control for Tadika Inovasi Kreatif
Linden Organisational and cross-organisational identity management.
Dobias et al. Identity and privacy issues throughout life
Scholl et al. Draft security architecture design process for health information exchanges (HIEs)
Ouko Identity management and user authentication approach for the implementation of bring your own device in organizations
Murray A Secure and Strategic Approach to Keep IoT Devices Safe from Malware Attack
Responders Mobile Application Single Sign-On
CAMERONI Providing Login and Wi-Fi Access Services With the eIDAS Network: A Practical Approach
Obote Identity and authentication Model for Bring your own Device in Organizations