Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2011, Lecture Notes in Computer Science
ABSTRACT Identity management consists of the processes and all underlying technologies for the creation, management, and usage of digital identities. Business rely on identity management systems to simplify the management of access rights to their systems and services for both their employees and their customers. Users may benefit from identity management to simplify logging in to websites and computer systems (single sign-on), as well as streamlining management of their personal information and preferences (user centricity). Current systems for identity management only partially achieve these goals, and still suffer from several security, privacy and usability issues. We will discuss how personal mobile devices (like mobile phones and PDA's) can be used to overcome this 'identity crisis', to increase the security, privacy and usability of identity management systems.
2008 The Third International Conference on Internet Monitoring and Protection
Identity Management in Mobile Ubiquitous Environments2008 •
2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing
Towards a Secure Identity Management in Smartphone Environments2013 •
2009 •
Abstract Users increasingly use their mobile devices to communicate, to conduct business transaction and access resources and services. In such a scenario, digital identity management (DIM) technology is fundamental in customizing user experience, protecting privacy, underpinning accountability in business transactions, and in complying with regulatory controls. Users identity consists of data, referred to as identity attributes, that encode relevant-security properties of the clients.
Indonesian Journal of Electrical Engineering and Computer Science
A critical insight into the identity authentication systems on smartphonesIn light of the staggering evolution of mobile technologies, the concept of mobility is gaining more attention worldwide. Recent statistics demonstrate mobile channels’ increasing significance in outreach and service delivery. However, governments and businesses face a challenge in reaping the benefits of mobile platforms: how to confirm the authenticity of mobile users and transactions. Mobile devices, by design, are well suited for enabling authentication and digital signing services, similar to traditional PC and laptop environments. But although various implementations support different authentication schemes, they still do not instill sufficient levels of trust and confidence. In this article we explore the practice of mobile identity management. We provide an overview of how EU countries tackle mobile identity. The main part of the article sheds light on the solution framework adopted in the United Arab Emirates (UAE) to address, recently launched mobile government transformation initiatives. Taking into account the newness of the topic, the content of this article should fuel the current limited knowledge base and trigger debate around the presented approaches.
2008 •
The problem of identity theft, that is, the act of impersonating others' identities by presenting stolen identifiers or proofs of identities, has been receiving increasing attention because of its high financial and social costs. In this paper we address such problem by proposing an approach to manage user identity attributes by assuring their privacy-preserving usage.
Internet Technologies and Applications Research
Identity Management in the Age of Mobilification2016 •
O presente trabalho possui como objetivo analisar e demonstrar teoricamente como o problema da sucessao nas empresas familiares e fator determinante para a afirmacao da prosperidade da sociedade ao longo das geracoes. Assim, procurou-se enxergar a questao de maneira a se concluir, em determinado momento, pela ineficiencia da adocao do atual modelo de sucessao previsto pelo Codigo Civil de 2002. Como alternativa a este sistema, foi lancado mao da constituicao da sociedade holding, visando o planejamento de maneira organizada e eficiente. Atraves desta sociedade, que podera ser fundada em qualquer tipo societario, sendo aconselhavel que se constitua em sociedade limitada ou sociedade anonima de capital, iremos facilitar de sobremaneira o processo sucessorio, agilizando-o, reduzindo custos e proporcionando estabilidade a empresa, vez que a afastara dos tradicionais problemas familiares que podem decorrer do processo sucessorio. Desta forma, passou-se a demonstrar os beneficios que essa...
2013 •
International Journal of Parasitology Research
Distribution of PFCRT Haplotypes and In-Vivo Efficacy of Chloroquine in Treatment of Uncomplicated P. Falciparum Malaria Before Deployment of Artemisinin Combination Therapies in Urban Population of Kolkata, India2011 •
2023 •
2013 •
2012 •
Journal of Biomedical and Pharmaceutical Research
Polyphenols: The Pharmaceutical Approach and International Health2022 •
Engineering Proceedings
Transport Vehicle Demand Prediction Using Context-Aware Neural Networks2024 •
MLN [Modern Languages Notes], Hispanic Issue, 138:2, 378-398.
Renuncia a la Ciudadanía e Imaginación Postnacional en la Obra Exílica de Josep Solanes2023 •