NUK - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources NUK. For full access, REGISTER.

1 2 3 4 5
hits: 2,832
21.
  • Connecting Self-Sovereign Identity with Federated and User-centric Identities via SAML Integration
    Yildiz, Hakan; Ritter, Christopher; Nguyen, Lan Thao ... 2021 IEEE Symposium on Computers and Communications (ISCC), 2021-Sept.-5
    Conference Proceeding

    Self-sovereign identity provides a feasible alternative to login via username and password through an identity provider to access digital services. It allows identity subjects to control and own ...
Full text
22.
  • Cord blood transplantation ... Cord blood transplantation is associated with good outcomes in secondary Acute Myeloid Leukaemia in first remission
    Baron, F.; Labopin, M.; Ruggeri, A. ... Journal of internal medicine, April 2019, Volume: 285, Issue: 4
    Journal Article, Web Resource
    Peer reviewed
    Open access

    Background We conducted a retrospective survey within the European Society for Blood and Marrow Transplantation (EBMT) registry to assess the outcomes of cord blood transplantation (CBT) in secondary ...
Full text

PDF
23.
  • Social Anchor: Privacy-Frie... Social Anchor: Privacy-Friendly Attribute Aggregation From Social Networks
    Ferdous, Md. Sadek; Chowdhury, Farida; Alassafi, Madini O. ... IEEE access, 2020, Volume: 8
    Journal Article
    Peer reviewed
    Open access

    In the last decade or so, we have experienced a tremendous proliferation and popularity of different Social Networks (SNs), resulting more and more user attributes being stored in such SNs. These ...
Full text

PDF
24.
  • Comparison of modeling form... Comparison of modeling formalisms for Safety Analyses: SAML and AltaRica
    Lipaczewski, Michael; Ortmeier, Frank; Prosvirnova, Tatiana ... Reliability engineering & system safety, August 2015, 2015-08-00, 20150801, Volume: 140
    Journal Article
    Peer reviewed

    Many states/transitions formalisms have been proposed in the literature to perform Safety Analyses. In this paper we compare two of them: SAML and AltaRica. These formalisms have been developed by ...
Full text
25.
  • Recent Advances towards the... Recent Advances towards the Understanding of Secondary Acute Myeloid Leukemia Progression
    Auerbach, Scott; Puka, Beana; Golla, Upendarrao ... Life (Basel, Switzerland), 02/2024, Volume: 14, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    Secondary acute myeloid leukemia (sAML) is a heterogeneous malignant hematopoietic disease that arises either from an antecedent hematologic disorder (AHD) including myelodysplastic syndromes (MDS), ...
Full text
26.
  • An Introduction to RA21: Ta... An Introduction to RA21: Taking Authentication Beyond IP Addresses
    Hoy, Matthew B. Medical reference services quarterly, 01/2019, Volume: 38, Issue: 1
    Journal Article
    Peer reviewed

    Providing access to electronic resources is a core service for most libraries, and for more than two decades librarians have used Internet Protocol (IP) addresses as a way to authenticate users and ...
Full text

PDF
27.
  • An improved security and pr... An improved security and privacy management system for data in multi-cloud environments using a hybrid approach
    Pachala, Sunitha; Rupa, Ch; Sumalatha, L. Evolutionary intelligence, 06/2021, Volume: 14, Issue: 2
    Journal Article
    Peer reviewed

    Storing and accessing the information in the multi-cloud hosting environment becomes popular these days. It offers benefits like the assurance of data protection, preventing information corruption, ...
Full text
28.
  • Microsoft Azure active dire... Microsoft Azure active directory for next level authentication to provide a seamless single sign-on experience
    Subbarao, D.; Raju, Bhagya; Anjum, Farha ... Applied nanoscience, 02/2023, Volume: 13, Issue: 2
    Journal Article
    Peer reviewed

    Authentication is crucial although if system which facilitates secure their networks by limiting access to protected resources such as networks, websites, network-based software, databases, and other ...
Full text
29.
  • Only SETBP1 hotspot mutatio... Only SETBP1 hotspot mutations are associated with refractory disease in myeloid malignancies
    Winkelmann, Nils; Schäfer, Vivien; Rinke, Jenny ... Journal of cancer research and clinical oncology, 12/2017, Volume: 143, Issue: 12
    Journal Article
    Peer reviewed

    Introduction SETBP1 mutations have been established as a diagnostic marker in myeloid malignancies and are associated with inferior survival. Since there is limited data on their clinical impact and ...
Full text
30.
  • STORK: a real, heterogeneou... STORK: a real, heterogeneous, large-scale eID management system
    Ribeiro, Carlos; Leitold, Herbert; Esposito, Simon ... International journal of information security, 10/2018, Volume: 17, Issue: 5
    Journal Article
    Peer reviewed

    Verifying who someone is on the Internet is a prerequisite for online services that process sensitive or valuable information. While this has been solved with national or sectorial electronic ...
Full text
1 2 3 4 5
hits: 2,832

Load filters