44 Hits in 2.7 sec

Introduction to Identity - Part 2: Access Management

Pamela Dingle
2020 IDPro Body of Knowledge  
Who are you, and what are you allowed to do? In digital systems, these questions are the domain of "Identity and Access Management (IAM)."  ...  You can expect a little advice, a lot of context, and an experience-based overview of what we do in access management and why our contributions matter.  ...  we designed our LDAP directories and login forms to stop responding if too many incorrect attempts were made.  ... 
doi:10.55621/idpro.45 fatcat:um4l7cqwhrapnk6uyael2lukga

Filter Based Directory Replication: Algorithms and Performance

A. Kumar
25th IEEE International Conference on Distributed Computing Systems (ICDCS'05)  
This paper describes a novel filter based replication model for Lightweight Directory Access Protocol (LDAP) directories.  ...  Directories have become an important component of the enterprise security and identity management middleware.  ...  Earlier work in database query caching [4] [5] [6] [7] [8] can not be directly applied to LDAP because of the inherent differences in data models and query languages of directories and relational databases  ... 
doi:10.1109/icdcs.2005.36 dblp:conf/icdcs/Kumar05 fatcat:felkmgi6wjgr3h6mkqdoczvtxy

Design, implementation, and performance of an automatic configuration service for distributed component systems

Fabio Kon, Jeferson Roberto Marques, Tomonori Yamane, Roy H. Campbell, M. Dennis Mickunas
2005 Software, Practice & Experience  
The architecture supports automatic configuration and dynamic resource management in distributed heterogeneous environments.  ...  We describe a concrete implementation of this architecture, present experimental results, and compare our approach to other works in the area.  ...  ACKNOWLEDGEMENTS The authors gratefully acknowledge the help and wise input provided by the 2K team at the University of Illinois during the development of this work.  ... 
doi:10.1002/spe.654 fatcat:m44r2gttevhzvkjz2nlmnk5ksm

The WebSphere Application Server architecture and programming model

E. Bayeh
1998 IBM Systems Journal  
, or any directory in the CLASSPATH.  ...  , the Java Naming and Directory Interface.  ... 
doi:10.1147/sj.373.0336 fatcat:gdkbntj6s5eyjagy6vjxmmy654

A Collaborative Platform to Support the Enterprise 2.0 in Active Interactions with Customers

Domenico CONSOLI
2012 Informatică economică  
This paper presents a model of a collaborative and interactive platform that supports the Enterprise 2.0 in the management of communications and relationships with all stakeholder of the supply chain and  ...  in particular with customers.  ...  Apache/Tomcat, IIS, WebSphere The platform must present also the following technological components: • Interface of user profiles with systems like Open LDAP and Active Directory that manage users, groups  ... 
doaj:11e83c846bb04b34bb1fe697ef46486b fatcat:prq6ir5vrva4tlyal63wbn6xi4

The dawning of the autonomic computing era

A. G. Ganek, T. A. Corbi
2003 IBM Systems Journal  
An evolution, not a revolution To implement autonomic computing, the industry must take an evolutionary approach and deliver im-provements to current systems that will provide significant self-managing  ...  Systems will need to build on top of a number of core security technologies already available today, including LDAP (Lightweight Directory Access Protocol), Kerberos, hardware encryption, and SSL (Secure  ... 
doi:10.1147/sj.421.0005 fatcat:asmfy2zly5dyrpl7ytoziddkhy

Customizable Protocol for Information Transfer Between Heterogeneous Platforms

Samudaya Nanayakkara
2019 Figshare  
It is designed in such a way, that most of the drawbacks of existing protocols and standards are eliminated.  ...  Heterogeneous systems will be able to use this new protocol to exchange their information in a more effective and flexible manner.  ...  Figure 3 . 3 14 SSL runs above TCP/IP and below application layer protocols HTTP LDAP IMAP …….....  ... 
doi:10.6084/m9.figshare.7712486 fatcat:b25us7xdevew3ercappyfg5wt4

The ATLAS Data Acquisition and High Level Trigger system

2016 Journal of Instrumentation  
11.2 kHz, i.e. 40.078 MHz (one clock signal for each beam and one clock signal equal to the maximum collision rate), and two clock signals with a frequency equal to the revolution frequency.  ...  check for incorrect L1Ids and BCIds in the RODs.  ...  The user-roles associations are defined in Lightweight Directory Access Protocol (LDAP) as Network Information Service (NIS) netgroups.  ... 
doi:10.1088/1748-0221/11/06/p06008 fatcat:wmldwzaqqnhrdgkjn3rdm4mvey

What Can Web Services Bring to Integrated Management? [chapter]

Aiko Pras, Jean-Philippe Martin-Flatin
2008 Handbook of Network and System Administration  
In Sections 5 and 6, we show that Web services can be used in integrated management in an evolutionary manner. The example studied here is network monitoring.  ...  In Section 6, we go back to the rationale behind SOA and compare it with fine-grained Web services.  ...  Early versions of this material were published in [24] , [54] and [77] .  ... 
doi:10.1016/b978-044452198-9.50013-6 fatcat:4sv72n36z5ddthu2gpit2kxwqq

SoS: self-organizing substrates

Anwitaman Datta
Higher-level directories, such as X.500/LDAP, consistently map properties to objects which are uniquely identified by their distinguished name (DN), i.e., their position in the X.500 tree.  ...  Almost all the ingredients for the next revolution were there -to democratize the internet -where users could access resources in general, and music files in particular, stored by fellow users over the  ...  We now determine the expectation value and standard deviation for δ 1 t (to simplify the presentation we will write t instead of t β in the following). Since E[γ i ] = 0 and E[γ 2 i ] = var[γ i ] =  ... 
doi:10.5075/epfl-thesis-3615 fatcat:afm6jal2brcg7dg2gmza4iqdkm

Automated Security Analysis of Web Application Technologies [article]

Malte Horst Arthur Skoruppa, Universität Des Saarlandes, Universität Des Saarlandes
We show how to model common vulnerabilities and evaluate our framework in a large-scale study, spotting hundreds of vulnerabilities. vii  ...  In the first part, we use a series of program transformations and information flow analysis to examine the JavaScript Helios voting client.  ...  The evolution is ongoing, with the Internet of things being the next revolution underway.  ... 
doi:10.22028/d291-26972 fatcat:j2pa5jxzujcqzkzd2dgiag3o4i

Towards improving the availability and performance of enterprise authorization systems

Qiang Wei
The first approach introduces and evaluates the mechanisms for authorization recycling in role-based access control systems.  ...  The algorithms that support these mechanisms allow a local secondary decision point to not only reuse previously-cached decisions but also infer new and correct decisions based on two simple rules, thereby  ...  Acknowledgements Acknowledgements ambitious, and for making me feel proud of my accomplishments. Their support has meant  ... 
doi:10.14288/1.0067777 fatcat:c6xvf54aojh3rnfznbvu4cmw54

The Role of Implementing Mobile Business Intelligence (MBI) in Decision Making Process: An Empirical Study at Jawwal Company

Hani Elkrunz
2013 Social Science Research Network  
Users can create and share knowledge and analysis in groups and across organizations since MBI platforms deliver insight everywhere, an application model, mobility and reassembly, and a social and collaborative  ...  The study population is composed of Jawwal employees in Gaza strip and West Band. 307 of the 350 distributed questionnaires have been retrieved, forming a recovery percentage of 87.8%.  ...  In mobile application, it is critical that authentication (such as password management) is managed centrally, preferably through a LDAP directory, so that a lost device does not result in unauthorized  ... 
doi:10.2139/ssrn.2450958 fatcat:zjkopnyn5nherib4r6vton42dm

Mobile Viewing and Self-Management of Patient's Electronic Health Records (EHRs) with MyHealthCloud

Muhammad Nsr Khan, Olga Ormandjieva, Kristina Pitula
2017 Proceedings of the 7th ACM Workshop on ACM Mobile Health 2017 - MobileHealth'17  
In the United States, the Food and Drug Administration (FDA) is encouraging the development of mobile medical applications that improve healthcare and provide consumers and healthcare professionals with  ...  In this thesis, we propose a novel mobile healthcare platform for the visualization and management of patients' medical reports, named MyHealthCloud.  ...  MyHealthCloud will not provide any second level privileges. • Application is vulnerable to LDAP Injection o Lightweight Directory Access Protocol (LDAP) Injection is used for manipulating directory services  ... 
doi:10.1145/3084035.3084038 fatcat:cko6uzoxprafjewbdqdt62hjim

Scientific Papers

2000 Technology and Health Care  
In order to keep the evolution of the health status under control, we are developing a management information system; sure we will take a long time, in which 168 Abstracts MEDNET 2000: Scientific papers  ...  Materials and methods: IRIS consists of several applications implemented in Java on client side respectively in C/C++ and Java on server side.  ...  Discussion: In the history of mankind there have been technological advances which have been decisive in its evolution.  ... 
doi:10.3233/thc-2000-83-406 fatcat:i2fpmzfem5gtxmxvwzb5hz3p44
« Previous Showing results 1 — 15 out of 44 results