Academic literature on the topic 'Credentials Management'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Credentials Management.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Credentials Management"
Ibrahim Khormi. "Towards Decentralized Academic Credential Management in Higher Education: Enhancing Security, Efficiency and Transparency - A Comprehensive Review." Journal of Information Systems Engineering and Management 10, no. 43s (May 7, 2025): 959–80. https://doi.org/10.52783/jisem.v10i43s.8502.
Full textZuo, Yanjun. "Towards a Learner-Managed Education Credentialing System Based on Blockchain." Information Resources Management Journal 35, no. 1 (January 1, 2022): 1–18. http://dx.doi.org/10.4018/irmj.309983.
Full textBuon, T., and B. Compton. "Credentials, Credentialism and Employee Selection." Asia Pacific Journal of Human Resources 28, no. 4 (November 1, 1990): 126–32. http://dx.doi.org/10.1177/103841119002800413.
Full textMerlec, Mpyana Mwamba, Md Mainul Islam, Youn Kyu Lee, and Hoh Peter In. "A Consortium Blockchain-Based Secure and Trusted Electronic Portfolio Management Scheme." Sensors 22, no. 3 (February 8, 2022): 1271. http://dx.doi.org/10.3390/s22031271.
Full textSurono, Surono. "Standard of Micro-Credential Quality Management System To Enhance Employability and Competitiveness of Graduates." Asian Journal of Social and Humanities 3, no. 1 (November 8, 2024): 196–209. http://dx.doi.org/10.59888/ajosh.v3i1.433.
Full textHurtado, Kristen, Jake Smithwick, Kenneth Sullivan, and Michael Bown. "Evaluating the Impact of Facility Management Credentials." Journal of Facility Management Education and Research 3, no. 2 (January 1, 2019): 44–53. http://dx.doi.org/10.22361/2474-6630-3.2.44.
Full textCarter, Jolynne “Jo. "Case Management Credentials." Professional Case Management 14, no. 5 (September 2009): 267–70. http://dx.doi.org/10.1097/ncm.0b013e3181badec1.
Full textFelkner, Anna. "Two Semantics of Trust Management Language with Negation." Journal of Telecommunications and Information Technology, no. 4 (December 30, 2013): 102–8. http://dx.doi.org/10.26636/jtit.2013.4.1245.
Full textOliver, Beverley. "Micro-credentials: A learner value framework." Journal of Teaching and Learning for Graduate Employability 12, no. 1 (September 16, 2021): 48–51. http://dx.doi.org/10.21153/jtlge2021vol12no1art1456.
Full textSuhag Pandya. "Innovative blockchain solutions for enhanced security and verifiability of academic credentials." International Journal of Science and Research Archive 6, no. 1 (June 30, 2022): 347–57. https://doi.org/10.30574/ijsra.2022.6.1.0225.
Full textDissertations / Theses on the topic "Credentials Management"
Veerkamp, Celeste Goff. "Gatekeepers to healthcare quality and patient safety| Veritas Credentials." Thesis, California State University, Long Beach, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10158999.
Full textThe current environment of healthcare requires organizations to look at each department and each employee from an economic vantage and to consider at all viable options for cost containment. An organization’s Medical Staff Office has traditionally taken responsibility for providing the credentials and privileging function for organizations. The amount of work and time as well as seasonal fluctuations in the number of applicants proves difficult for an organization from a staffing and budgetary standpoint. For many organizations, the ability to outsource its credentialing functions to a Credentials Verification Organization may prove a cost efficient option.
Veritas Credentials seeks to remedy this difficulty for healthcare organizations by allowing the credential and privilege function to be outsourced. This business plan will show how Veritas Credentials intends to provide an array of services to ensure that healthcare organizations provide privileges to high quality providers which will ensure patient safety.
Phiri, Jackson. "A digital identity management system." Thesis, UWC, 2007. http://hdl.handle.net/11394/2871.
Full textThe recent years have seen an increase in the number of users accessing online services using communication devices such as computers, mobile phones and cards based credentials such as credit cards. This has prompted most governments and business organizations to change the way they do business and manage their identity information. The coming of the online services has however made most Internet users vulnerable to identity fraud and theft. This has resulted in a subsequent increase in the number of reported cases of identity theft and fraud, which is on the increase and costing the global industry excessive amounts. Today with more powerful and effective technologies such as artificial intelligence, wireless communication, mobile storage devices and biometrics, it should be possible to come up with a more effective multi-modal authentication system to help reduce the cases of identity fraud and theft. A multi-modal digital identity management system is proposed as a solution for managing digital identity information in an effort to reduce the cases of identity fraud and theft seen on most online services today. The proposed system thus uses technologies such as artificial intelligence and biometrics on the current unsecured networks to maintain the security and privacy of users and service providers in a transparent, reliable and efficient way. In order to be authenticated in the proposed multi-modal authentication system, a user is required to submit more than one credential attribute. An artificial intelligent technology is used to implement a technique of information fusion to combine the user’s credential attributes for optimum recognition. The information fusion engine is then used to implement the required multi-modal authentication system.
Freel, Amy E. "Availability, credentials, and qualifications of nutrition providers of Division IA selected women's intercollegiate athletic programs." Virtual Press, 2000. http://liblink.bsu.edu/uhtbin/catkey/1191707.
Full textDepartment of Family and Consumer Sciences
Khodaei, Mohammad. "Secure and Privacy Preserving Vehicular Communication Systems: Identity and Credential Management Infrastructure." Licentiate thesis, KTH, Kommunikationsnät, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-193030.
Full textQC 20160927
Lauer, Mark J. "Validating the ISPI standards and principles for the Certified Performance Technologist credential." [Bloomington, Ind.] : Indiana University, 2008. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3331327.
Full textTitle from PDF t.p. (viewed on Jul 24, 2009). Source: Dissertation Abstracts International, Volume: 69-11, Section: A, page: 4407. Adviser: James Pershing.
Absuelo, Ruby. "Employability of Philippine college and university graduates in the United States." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2014. https://ro.ecu.edu.au/theses/868.
Full textLindegren, Daniel. "Designing for user awareness and usability : An evaluation of authorization dialogs on a mobile device." Thesis, Karlstads universitet, Handelshögskolan, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-62731.
Full textCREDENTIAL
Bauer, David Allen. "Preserving privacy with user-controlled sharing of verified information." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/31676.
Full textCommittee Chair: Blough, Douglas; Committee Member: Ahamad, Mustaque; Committee Member: Liu, Ling; Committee Member: Riley, George; Committee Member: Yalamanchili, Sudha. Part of the SMARTech Electronic Thesis and Dissertation Collection.
Noroozi, Hamid. "A Cloud-native Vehicular Public Key Infrastructure : Towards a Highly-available and Dynamically- scalable VPKIaaS." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-300658.
Full textAnsträngningar för standardisering av Vehicular Communication Systems har varit avgörande för användandet av Vehicular Public-Key Infrastructure (VPKI) för att etablera förtroende mellan nätverksdeltagare. Användande av VPKI i Vehicular Communication (VC) garanterar integritet och autenticitet av meddelanden. Det erbjuder ett lager av säkerhet för fordon då VPKI ger dem en mängd av icke länkbara certifikat, kallade pseudonym, som används medan de kommunicerar med andra fordon, kallat Vehicle-to-Vehicle (V2V) eller Roadside Units (RSUs) kallat Vehicle-to-Infrastructure (V2I). Varje fordon använder ett pseudonym under en begränsad tid och genom att byta till ett icke tidigare använt pseudonym kan det fortsätta kommunicera utan att riskera sin integritet. I litteratur har två metoder föreslagits för hur man ska ladda fordon med pseudonym de behöver. Den ena metoden det så kallade offline-läget, som proponerar att man för-laddar fordonen med alla pseudonym som det behöver vilket ökar kostnaden för revokering i fall de blir komprometterat. Den andra metoden föreslår ett on-demand tillvägagångssätt som erbjuder pseudonym via VPKI på fordonets begäran vid början av varje färd. Valet av på begäran metoden sätter en stor börda på tillgänglighet och motståndskraft av VPKI tjänster. I det här arbetet, möter vi problem med storskaliga driftsättningar av en på begäran VPKI som är motståndskraftig, har hög tillgänglighet och dynamiskt skalbarhet i syfte att uppnå dessa attribut genom att nyttja toppmoderna verktyg och designparadigmer. Vi har förbättrat ett VPKI system för att säkerställa att det är kapabelt att möta SLA:er av företagsklass gällande tillgänglighet och att det även kan vara kostnadseffektivt eftersom tjänster dynamiskt kan skala ut vid högre last eller skala ner vid lägre last. Detta har möjliggjorts genom att arkitekta om en existerande VPKI till en cloud-native lösning driftsatt som mikrotjänster. En av nyckelutmaningarna till att ha en pålitlig arkitektur baserad på distribuerade mikrotjänster är sybil-baserad missuppförande. Genom att utnyttja Sybil baserade attacker på VPKI, kan illvilliga fordon påverka trafik att tjäna dess egna syften. Därför är det av största vikt att förhindra Sybil attacker. Å andra sidan så dras traditionella metoder att stoppa dem med prestandakostnader. Vi föreslår en lösning för att adressera Sybilbaserade attacker genom att nyttja Redis, en in-memory data-store utan att märkbart kompromissa på systemets effektivitet och prestanda. Att köra våra VPKI tjänster på Google Cloud Platform (GCP) och genomföra diverse stresstester mot dessa har visat att storskaliga driftsättningar av VPKI as a Service (VPKIaaS) kan göras effektivt samtidigt som riktigt trafik hanteras. Vi har testat VPKIaaS under syntetisk genererat normalt trafikflöde samt flow och flash mängd scenarier. Det har visat sig att VPKIaaS klarar att utfärda 100 pseudonym per förfråga utsänt av 1000 fordon (där fordonen bad om en ny uppsättning pseudonym varje 1 till 5 sekunder), och varje fordon fått svar inom 77 millisekunder. Vi demonstrerar även att under en flashcrowd situation, där antalet fordon höjs till 50000 med en kläckningsgrad på 100. VPKIaaS dynamiskt skalar ut och tar ≈192 millisekunder att betjäna 100 pseudonymer per förfrågan gjord av fordon.
Thummala, Vamsidhar. "SAFE: A Declarative Trust-Agile System with Linked Credentials." Diss., 2016. http://hdl.handle.net/10161/12236.
Full textSecure Access For Everyone (SAFE), is an integrated system for managing trust
using a logic-based declarative language. Logical trust systems authorize each
request by constructing a proof from a context---a set of authenticated logic
statements representing credentials and policies issued by various principals
in a networked system. A key barrier to practical use of logical trust systems
is the problem of managing proof contexts: identifying, validating, and
assembling the credentials and policies that are relevant to each trust
decision.
SAFE addresses this challenge by (i) proposing a distributed authenticated data
repository for storing the credentials and policies; (ii) introducing a
programmable credential discovery and assembly layer that generates the
appropriate tailored context for a given request. The authenticated data
repository is built upon a scalable key-value store with its contents named by
secure identifiers and certified by the issuing principal. The SAFE language
provides scripting primitives to generate and organize logic sets representing
credentials and policies, materialize the logic sets as certificates, and link
them to reflect delegation patterns in the application. The authorizer fetches
the logic sets on demand, then validates and caches them locally for further
use. Upon each request, the authorizer constructs the tailored proof context
and provides it to the SAFE inference for certified validation.
Delegation-driven credential linking with certified data distribution provides
flexible and dynamic policy control enabling security and trust infrastructure
to be agile, while addressing the perennial problems related to today's
certificate infrastructure: automated credential discovery, scalable
revocation, and issuing credentials without relying on centralized authority.
We envision SAFE as a new foundation for building secure network systems. We
used SAFE to build secure services based on case studies drawn from practice:
(i) a secure name service resolver similar to DNS that resolves a name across
multi-domain federated systems; (ii) a secure proxy shim to delegate access
control decisions in a key-value store; (iii) an authorization module for a
networked infrastructure-as-a-service system with a federated trust structure
(NSF GENI initiative); and (iv) a secure cooperative data analytics service
that adheres to individual secrecy constraints while disclosing the data. We
present empirical evaluation based on these case studies and demonstrate that
SAFE supports a wide range of applications with low overhead.
Dissertation
Books on the topic "Credentials Management"
Sheff, Richard A. Credentials committee: Essentials handbook. Danvers, MA: HCPro, 2012.
Find full textUnited States. Department of Homeland Security. Office of Inspector General. FEMA's progress in implementing employee credentials. Washington, DC: Department of Homeland Security, Office of Inspector General, 2012.
Find full textWilliam, Dutcher, Khan Jamil, and National Institute of Standards and Technology (U.S.), eds. An ontology of identity credentials. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2006.
Find full text1940-, Kohl Kay Jordan, and LaPidus Jules B, eds. Postbaccalaureate futures: New markets, resources, credentials. Phoenix, Ariz: Oryx Press, 2000.
Find full textColorado. Dept. of Regulatory Agencies. Office of Policy, Research, and Regulatory Reform. 2007 sunset review, Air Quality Science Advisory Board: Dynamic Modeling Advisory Committee : Forest Restoration Pilot Program, Technical Advisory Panel : Health Care Credentials Application Review Committee. [Denver, Colo.]: Colorado Department of Regulatory Agencies, Office of Policy, Research and Regulatory Reform, 2007.
Find full textAssociation, International Facility Management. Evaluating the Value : International Facility Management Facility Management Credentials: CFM, FMP & SFP Credentials September 2022. International Facility Management Association, 2022.
Find full textHurtado, Krsten. Engaging Member Companies to Enhance the Value and Perceptions of IFMA Credentials: International Facility Management Association Facility Management Credentials. International Facility Management Association, 2024.
Find full textThomas, Willis H. Basics of Achieving Professional Certification: Enhancing Your Credentials. Productivity Press, 2017.
Find full textThomas, Willis H. Basics of Achieving Professional Certification: Enhancing Your Credentials. Taylor & Francis Group, 2017.
Find full textLukas, Karen Hammerlund. The educational system of the Federal Republic of Germany: A guide for evaluating educational credentials. Additional copies can be ordered from International Education Services of Minnestota, 2002.
Find full textBook chapters on the topic "Credentials Management"
Barnes, Robert L. "Competencies, Credentials, Education, and Training." In International Facility Management, 5–38. Oxford: John Wiley & Sons, 2013. http://dx.doi.org/10.1002/9781118771686.ch2.
Full textFelkner, Anna, and Adam Kozakiewicz. "Practical Extensions of Trust Management Credentials." In Advances in Intelligent Systems and Computing, 167–80. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-44354-6_10.
Full textBenson, Glenn, Shiu-Kai Chin, Sean Croston, Karthick Jayaraman, and Susan Older. "Credentials Management for High-Value Transactions." In Lecture Notes in Computer Science, 169–82. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14706-7_13.
Full textPearson, Siani, and Marco Casassa Mont. "Provision of Trusted Identity Management Using Trust Credentials." In Lecture Notes in Computer Science, 267–82. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11755593_20.
Full textvan den Broek, Fabian, Brinda Hampiholi, and Bart Jacobs. "Securely Derived Identity Credentials on Smart Phones via Self-enrolment." In Security and Trust Management, 106–21. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46598-2_8.
Full textBistarelli, Stefano, Fabio Martinelli, Francesco Roperti, and Francesco Santini. "Negotiation of Weighted RTML Credentials on Mobile Devices." In Information Systems: Crossroads for Organization, Management, Accounting and Engineering, 429–38. Heidelberg: Physica-Verlag HD, 2012. http://dx.doi.org/10.1007/978-3-7908-2789-7_47.
Full textWu, Bin, Dengguo Feng, and Meijiao Duan. "Privacy Preserving of Trust Management Credentials Based on Trusted Computing." In Information Security, Practice and Experience, 251–63. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12827-1_19.
Full textYin, Gang, Huaimin Wang, Jianquan Ouyang, Ning Zhou, and Dianxi Shi. "Towards Role Based Trust Management without Distributed Searching of Credentials." In Information and Communications Security, 222–37. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88625-9_15.
Full textWästlund, Erik, and Simone Fischer-Hübner. "The Users’ Mental Models’ Effect on their Comprehension of Anonymous Credentials." In Privacy and Identity Management for Life, 233–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-20317-6_12.
Full textSabouri, Ahmad. "On the User Acceptance of Privacy-Preserving Attribute-Based Credentials – A Qualitative Study." In Data Privacy Management and Security Assurance, 130–45. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47072-6_9.
Full textConference papers on the topic "Credentials Management"
Romasanta, Joan Katherine N., and Marlon A. Diloy. "Micro-Credentials : Educator's Perspective." In 2024 5th Technology Innovation Management and Engineering Science International Conference (TIMES-iCON), 1–4. IEEE, 2024. http://dx.doi.org/10.1109/times-icon61890.2024.10630712.
Full textHerbke, Patrick, Anish Sapkota, and Sid Lamichhane. "Lifecycle Management of Resumés with Decentralized Identifiers and Verifiable Credentials." In 2024 6th Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), 1–3. IEEE, 2024. http://dx.doi.org/10.1109/brains63024.2024.10732402.
Full textLunesu, Maria Ilaria, Andrea Pinna, Riccardo Lai, and Xiaofeng Wang. "Blockchain-Based Verifiable Credentials for Virtual Teams Management in the Metaverse." In 2024 IEEE International Conference on Software Analysis, Evolution and Reengineering - Companion (SANER-C), 64–67. IEEE, 2024. http://dx.doi.org/10.1109/saner-c62648.2024.00013.
Full textByun, SangHyun, Arijet Sarker, Sang-Yoon Chang, and Jugal Kalita. "Blockchain-Based Trust Management in Security Credential Management System for Vehicular Network." In 2025 28th Conference on Innovation in Clouds, Internet and Networks (ICIN), 194–201. IEEE, 2025. https://doi.org/10.1109/icin64016.2025.10942972.
Full textDubini, Simone Pietro, Valentina Balostro, Paolo de Francesco, and Vittorio Colombo. "A Decision Support System for Materials Selection of Well Completion in the Modern Oil and Gas Industry." In CORROSION 2013, 1–14. NACE International, 2013. https://doi.org/10.5006/c2013-02370.
Full textHerbke, Patrick, Thomas Cory, and Mauro Migliardi. "Decentralized Credential Status Management: A Paradigm Shift in Digital Trust." In 2024 6th Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), 1–10. IEEE, 2024. http://dx.doi.org/10.1109/brains63024.2024.10732832.
Full textGupta, Harsh S., Khushi S. Kasat, Abhijeet R. Raipurkar, and Praful R. Pardhi. "CredVault: A Credential Management System based on Zero-Knowledge Proofs." In 2024 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS), 1–6. IEEE, 2024. https://doi.org/10.1109/icbds61829.2024.10837111.
Full textAlam, Junaid, Binay Kumar Gupta, Ananya Gupta, and S. Maity. "Blockchain-Based Fellowship Management System with Zero-Knowledge Credential Verification." In 2024 13th International Conference on System Modeling & Advancement in Research Trends (SMART), 487–94. IEEE, 2024. https://doi.org/10.1109/smart63812.2024.10882489.
Full textDas, Nabanita, and Subhashis Das. "BCredS: Blockchain Leveraged Secure System for Credential Management in Emergency Scenarios." In 2024 4th International Conference on Computer, Communication, Control & Information Technology (C3IT), 1–6. IEEE, 2024. https://doi.org/10.1109/c3it60531.2024.10829445.
Full textPfeiffer, Alexander, Thomas Wernbacher, Vincent Vella, and Alexiei Dingli. "BLOCKCHAIN IN EDUCATIONAL GAMING: STUDENT PERSPECTIVES ON DIGITAL IDENTITY AND CREDENTIAL MANAGEMENT." In 17th annual International Conference of Education, Research and Innovation, 4925–30. IATED, 2024. https://doi.org/10.21125/iceri.2024.1215.
Full textReports on the topic "Credentials Management"
Azzutti, Alessio, Mark Cummins, Iain MacNeil, and Chuks Otioma. Simplifying Compliance: The Role of AI and RegTech. University of Glasgow and University of Strathclyde, March 2025. https://doi.org/10.36399/gla.pubs.351604.
Full text