Academic literature on the topic 'Credentials Management'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Credentials Management.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Credentials Management"

1

Ibrahim Khormi. "Towards Decentralized Academic Credential Management in Higher Education: Enhancing Security, Efficiency and Transparency - A Comprehensive Review." Journal of Information Systems Engineering and Management 10, no. 43s (May 7, 2025): 959–80. https://doi.org/10.52783/jisem.v10i43s.8502.

Full text
Abstract:
Academic credentials are representative evidence for knowledge or skills gained over a stipulated period of time by individuals. These credentials are expected to carry unique features that identify a particular individual. They should be managed and processed in such a way that they are secure and tampered proof. Traditional methods of credential management are characterized by inefficiency and vulnerability to fraud, forgery and manipulation. They also depend on intermediary centralized authorities which create bottle neck in the verification of credentials. Decentralized technologies such as blockchain and self-sovereign identity offer transformative alternatives to management and processing of academic credentials that could overcome the challenges with traditional methods. This paper presents a comprehensive review on the challenges in the traditional system of education, focusing on academic credential management and the use of decentralized technology for credential management. In this regard, existing literature that relates to three important issues (efficiency, transparency and security of data) in academic credential management is reviewed. Several studies on academic credential management that are based on blockchain technology have been reviewed and analyzed. More specifically, a comparative analysis of different credential management models in terms of efficiency, security and transparency is conducted. Based on the findings from this survey, a decentralized, efficient, transparent, immutable and secure solution for academic credential management in HEIs is possible. This survey contributes to the growing body of knowledge and can form a foundation for this important area of research. The identified research gaps are discussed, and recommendations are made as guide to future research direction in the adoption and implementation of decentralized credential management system in HEIs.
APA, Harvard, Vancouver, ISO, and other styles
2

Zuo, Yanjun. "Towards a Learner-Managed Education Credentialing System Based on Blockchain." Information Resources Management Journal 35, no. 1 (January 1, 2022): 1–18. http://dx.doi.org/10.4018/irmj.309983.

Full text
Abstract:
Traditionally, a learner's education credentials are maintained by each educational institution. When individuals need to prove their education, they rely on their educational institutions to certify their education and learning records. This paper proposes a decentralized, learner-managed education credentialing system based on blockchain, where the learners' credentials are issued once, stored in a distributed system, and the learners have full control over how and who can access their credentials. The authors present the procedures for credential issuance, selective disclosure of an individual's credentials chosen by each learner, and credential verification by a third party. A proof-of-concept smart contract system has been developed to demonstrate the functionality of the proposed framework. The smart contracts are programmed using the Solidity programming language and tested on the Remix IDE. The authors present this simulation of smart contracts to handle entity registration, credential information storage, credential verification, and educational financial transactions.
APA, Harvard, Vancouver, ISO, and other styles
3

Buon, T., and B. Compton. "Credentials, Credentialism and Employee Selection." Asia Pacific Journal of Human Resources 28, no. 4 (November 1, 1990): 126–32. http://dx.doi.org/10.1177/103841119002800413.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Merlec, Mpyana Mwamba, Md Mainul Islam, Youn Kyu Lee, and Hoh Peter In. "A Consortium Blockchain-Based Secure and Trusted Electronic Portfolio Management Scheme." Sensors 22, no. 3 (February 8, 2022): 1271. http://dx.doi.org/10.3390/s22031271.

Full text
Abstract:
In recent times, electronic portfolios (e-portfolios) are being increasingly used by students and lifelong learners as digital online multimedia résumés that showcase their skill sets and achievements. E-portfolios require secure, reliable, and privacy-preserving credential issuance and verification mechanisms to prove learning achievements. However, existing systems provide private institution-wide centralized solutions that primarily rely on trusted third parties to issue and verify credentials. Furthermore, they do not enable learners to own, control, and share their e-portfolio information across organizations, which increases the risk of forged and fraudulent credentials. Therefore, we propose a consortium blockchain-based e-portfolio management scheme that is decentralized, secure, and trustworthy. Smart contracts are leveraged to enable learners to completely own, publish, and manage their e-portfolios, and also enable potential employers to verify e-portfolio credentials and artifacts without relying on trusted third parties. Blockchain is used as an immutable distributed ledger that records all transactions and logs for tamper-proof trusted data provenance, accountability, and traceability. This system guarantees the authenticity and integrity of user credentials and e-portfolio data. Decentralized identifiers and verifiable credentials are used for user profile identification, authentication, and authorization, whereas verifiable claims are used for e-portfolio credential proof authentication and verification. We have designed and implemented a prototype of the proposed scheme using a Quorum consortium blockchain network. Based on the evaluations, our solution is feasible, secure, and privacy-preserving. It offers excellent performance.
APA, Harvard, Vancouver, ISO, and other styles
5

Surono, Surono. "Standard of Micro-Credential Quality Management System To Enhance Employability and Competitiveness of Graduates." Asian Journal of Social and Humanities 3, no. 1 (November 8, 2024): 196–209. http://dx.doi.org/10.59888/ajosh.v3i1.433.

Full text
Abstract:
The development of a Micro-Credential Quality Management System (QMS) aims to ensure that micro-credentials are of high quality and aligned with industry needs. Micro-credentials provide formal recognition of specific competencies acquired through short-term, focused learning, offering an efficient means to address the rapidly evolving labor market and technological landscape. This research adopts a Research and Development (R&D) methodology, involving a preliminary study, system development, pilot testing, and validation, to create a robust QMS framework. The QMS focuses on establishing clear standards, rigorous assessment processes, continuous improvement, and collaboration with industry stakeholders to validate competencies. The pilot testing of the QMS in vocational high schools demonstrated its effectiveness in enhancing the relevance and recognition of micro-credentials. The system ensures that issued credentials are aligned with industry demands, improving graduates' employability and competitiveness. The findings indicate that a well-developed QMS for micro-credentials can address gaps in standardization and ensure that credentials are valid, reliable, and recognized across different sectors. The implementation of the QMS facilitates tailored skill acquisition, lifelong learning, and global recognition, making it a critical tool for enhancing workforce readiness and competitiveness.
APA, Harvard, Vancouver, ISO, and other styles
6

Hurtado, Kristen, Jake Smithwick, Kenneth Sullivan, and Michael Bown. "Evaluating the Impact of Facility Management Credentials." Journal of Facility Management Education and Research 3, no. 2 (January 1, 2019): 44–53. http://dx.doi.org/10.22361/2474-6630-3.2.44.

Full text
Abstract:
ABSTRACT The field of facility management (FM) has existed alongside other related fields, such as engineering and construction, yet its place within traditional education pathways is less formalized than is the case with other areas of the built environment. As such, those seeking entry into the profession will discover that it is largely undefined and a function of experience, with many professionals looking to supplement their experience with credentials and continuing education to better prepare themselves for advancement in the FM profession. To better understand and evaluate the impact and value of FM credentials in the industry and for its members, data were collected through two online international surveys of FM professionals and FM organizations. The research was commissioned by the International Facility Management Association (IFMA). The results indicate that FM professionals experience value in attaining a credential, and their employers also benefit. The return on investment of the IFMA credentials was calculated to be 15:1 over five years.
APA, Harvard, Vancouver, ISO, and other styles
7

Carter, Jolynne “Jo. "Case Management Credentials." Professional Case Management 14, no. 5 (September 2009): 267–70. http://dx.doi.org/10.1097/ncm.0b013e3181badec1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Felkner, Anna. "Two Semantics of Trust Management Language with Negation." Journal of Telecommunications and Information Technology, no. 4 (December 30, 2013): 102–8. http://dx.doi.org/10.26636/jtit.2013.4.1245.

Full text
Abstract:
The family of Role-based Trust management languages is used for representing security policies by defining a formalism, which uses credentials to handle trust in decentralized, distributed access control systems. A credential provides information about the privileges of users and the security policies issued by one or more trusted authorities. The main topic of this paper is RT⊖, a language which provides a carefully controlled form of non-monotonicity. The core part of the paper defines two different semantics of RT⊖ language – a relational, set-theoretic semantics for the language, and an inference system, which is a kind of operational semantics. The set-theoretic semantics maps roles to a set of entity names. In the operational semantics credentials can be derived from an initial set of credentials using a set of inference rules. The soundness and the completeness of the inference system with respect to the set-theoretic semantics of RT⊖ will be proven.
APA, Harvard, Vancouver, ISO, and other styles
9

Oliver, Beverley. "Micro-credentials: A learner value framework." Journal of Teaching and Learning for Graduate Employability 12, no. 1 (September 16, 2021): 48–51. http://dx.doi.org/10.21153/jtlge2021vol12no1art1456.

Full text
Abstract:
Much has been made of micro-credentials, and the ‘craze’ (Ralston, 2021) and ‘hype’ (Roy & Clark, 2019) they generate. One of the barriers to their success is that a definition of micro-credentials has not been widely agreed (Kato, Galán-Muros, & Weko, 2020). However, to succeed, micro-credentials need not just a definition, but a way to ensure they are valued, and bring value to key stakeholders: particularly learners, employers and providers. To this end, this provocation proposes a micro-credential value framework that sets out their key benefits and costs for learners.
APA, Harvard, Vancouver, ISO, and other styles
10

Suhag Pandya. "Innovative blockchain solutions for enhanced security and verifiability of academic credentials." International Journal of Science and Research Archive 6, no. 1 (June 30, 2022): 347–57. https://doi.org/10.30574/ijsra.2022.6.1.0225.

Full text
Abstract:
The growing demand for secure and tamper-proof academic credential management has exposed the limitations of traditional systems, including susceptibility to fraud, inefficiency, and dependency on centralised authorities. Blockchain technology, with its decentralisation, immutability, and cryptographic security, offers a transformative approach to issuing, storing, and verifying academic credentials. This paper explores blockchain architectures—public, private, and consortium—and their application in academic systems. Applying smart contracts and decentralised architectures, blockchain improves trust and transparency and optimises credential checking. OpenCerts and eScroll are presented, referring to existing implementations, to demonstrate possibility and impact on the real world. The study outlines issues such as scale, privacy and interoperability Lastly, the study outlines directions for future research for enhanced blockchain use in managing academic credentials globally.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Credentials Management"

1

Veerkamp, Celeste Goff. "Gatekeepers to healthcare quality and patient safety| Veritas Credentials." Thesis, California State University, Long Beach, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10158999.

Full text
Abstract:

The current environment of healthcare requires organizations to look at each department and each employee from an economic vantage and to consider at all viable options for cost containment. An organization’s Medical Staff Office has traditionally taken responsibility for providing the credentials and privileging function for organizations. The amount of work and time as well as seasonal fluctuations in the number of applicants proves difficult for an organization from a staffing and budgetary standpoint. For many organizations, the ability to outsource its credentialing functions to a Credentials Verification Organization may prove a cost efficient option.

Veritas Credentials seeks to remedy this difficulty for healthcare organizations by allowing the credential and privilege function to be outsourced. This business plan will show how Veritas Credentials intends to provide an array of services to ensure that healthcare organizations provide privileges to high quality providers which will ensure patient safety.

APA, Harvard, Vancouver, ISO, and other styles
2

Phiri, Jackson. "A digital identity management system." Thesis, UWC, 2007. http://hdl.handle.net/11394/2871.

Full text
Abstract:
>Magister Scientiae - MSc
The recent years have seen an increase in the number of users accessing online services using communication devices such as computers, mobile phones and cards based credentials such as credit cards. This has prompted most governments and business organizations to change the way they do business and manage their identity information. The coming of the online services has however made most Internet users vulnerable to identity fraud and theft. This has resulted in a subsequent increase in the number of reported cases of identity theft and fraud, which is on the increase and costing the global industry excessive amounts. Today with more powerful and effective technologies such as artificial intelligence, wireless communication, mobile storage devices and biometrics, it should be possible to come up with a more effective multi-modal authentication system to help reduce the cases of identity fraud and theft. A multi-modal digital identity management system is proposed as a solution for managing digital identity information in an effort to reduce the cases of identity fraud and theft seen on most online services today. The proposed system thus uses technologies such as artificial intelligence and biometrics on the current unsecured networks to maintain the security and privacy of users and service providers in a transparent, reliable and efficient way. In order to be authenticated in the proposed multi-modal authentication system, a user is required to submit more than one credential attribute. An artificial intelligent technology is used to implement a technique of information fusion to combine the user’s credential attributes for optimum recognition. The information fusion engine is then used to implement the required multi-modal authentication system.
APA, Harvard, Vancouver, ISO, and other styles
3

Freel, Amy E. "Availability, credentials, and qualifications of nutrition providers of Division IA selected women's intercollegiate athletic programs." Virtual Press, 2000. http://liblink.bsu.edu/uhtbin/catkey/1191707.

Full text
Abstract:
The purpose of this study was to examine the availability, credentials, and qualifications of nutrition providers for Division IA intercollegiate athletic programs that have competitive women's gymnastics, women's swimming and women's cross country, or a combination of two of these sports. It was also the purpose of the study to identify if relationships exists between demographic factors and 1). The employer of the nutrition provider, 2) the title of the nutrition provider and 3) the availability of nutrition education.Surveys were sent to 161 Division IA Athletic Directors. The institutions selected in the study have competitive women's gymnastics, women's swimming and women's cross country, or a combination of tow of these sports. The National Directory of College Athletics was used for selection of the universities participating in this study. A 69% return rate was achieved and all surveys were deemed useable.
Department of Family and Consumer Sciences
APA, Harvard, Vancouver, ISO, and other styles
4

Khodaei, Mohammad. "Secure and Privacy Preserving Vehicular Communication Systems: Identity and Credential Management Infrastructure." Licentiate thesis, KTH, Kommunikationsnät, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-193030.

Full text
Abstract:
Vehicular Communication (VC) systems can greatly enhance road safety and transportation efficiency. Vehicles are equipped with sensors to sense their surroundings and the internal Controller Area Network (CAN) bus. Hence, vehicles are becoming part of a large-scale network, the so-called Internet of Vehicles (IoV). Deploying such a large-scale VC system cannot materialize unless the VC systems are secure and do not expose their users’ privacy. Vehicles could be compromised or their sensors become faulty, thus disseminating erroneous information across the network. Therefore, participating vehicles should be accountable for their actions. Moreover, user privacy is at stake: vehicles should disseminate spatio-temporal information frequently. Due to openness of the wireless communication, an observer can eavesdrop the communication to infer users’ sensitive information, thus profiling users. The objective is to secure the communication, i.e., prevent malicious or compromised entities from affecting the system operation, and ensure user privacy, i.e., keep users anonymous to any external observer but also for security infrastructure entities and service providers.In this thesis, we focus on the identity and credential management infrastructure for VC systems, taking security, privacy, and efficiency into account. We begin with a detailed investigation and critical survey of the standardization and harmonization efforts. We point out the remaining challenges to be addressed in order to build a Vehicular Public-Key Infrastructure (VPKI). We provide a VPKI design that improves upon existing proposals in terms of security and privacy protection and efficiency. More precisely, our scheme facilitates multi-domain operations in VC systems and enhances user privacy, notably preventing linking of pseudonyms based on timing information and offering increased protection in the presence of honest-but-curious VPKI entities. We further extensively evaluate the performance of the full-blown implementation of our VPKI for a large-scale VC deployment. Our results confirm the efficiency, scalability and robustness of our VPKI.

QC 20160927

APA, Harvard, Vancouver, ISO, and other styles
5

Lauer, Mark J. "Validating the ISPI standards and principles for the Certified Performance Technologist credential." [Bloomington, Ind.] : Indiana University, 2008. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3331327.

Full text
Abstract:
Thesis (Ph.D.)--Indiana University, Dept. of Instructional Systems Technology, 2008.
Title from PDF t.p. (viewed on Jul 24, 2009). Source: Dissertation Abstracts International, Volume: 69-11, Section: A, page: 4407. Adviser: James Pershing.
APA, Harvard, Vancouver, ISO, and other styles
6

Absuelo, Ruby. "Employability of Philippine college and university graduates in the United States." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2014. https://ro.ecu.edu.au/theses/868.

Full text
Abstract:
Limited economic opportunity for many Filipinos has created substantial emigration of the country’s educated work force. The economic opportunities in the United States have attracted Philippine immigrants seeking employment opportunities. Thus, the U.S. now has a substantial foreign-born Filipino population. Although the majority of Philippine immigrants to the U.S. possess bachelor’s degrees or advanced degrees (Allard & Bureau of Labor Statistics, 2011; Camarota, 2012; Commission on Filipinos Overseas, 2012), many are underemployed or work in fields relatively unrelated to their education and experience. This thesis examines Philippine college and university graduates’ social networks, educational attainment, degree field, English language proficiency, immigration status, age, and gender, factors which influence and determine Philippine graduates’ employability in the U.S. labour market. The Triangulation Mixed Methods Design also known as the Concurrent Triangulation Design was employed to effectively measure the complex phenomenon of Philippine graduates’ employability by integrating quantitative and qualitative data sets. The null hypotheses for this thesis were rejected exclusive of age and gender differences. Data revealed employability was enhanced when Philippine graduates networked with Weak Ties during initial employment and continued to be advantageous for being adequately employed (i.e. resulted in lower underemployment). However, lower employability and underemployment negatively affected graduates with a bachelor’s degree (particularly a business-related degree), those who were less proficient in English, and those who were Green Card holders. The factors that were influential in the employability of Philippine graduates coincided with the labour market demands of the American employers sampled in this study. The thesis found that the current status of Philippine graduates has improved substantially with a higher percentage of the respondents obtaining jobs commensurate with their educational qualifications as opposed to their initial employment. Philippine graduates with medical technology degrees were particularly successful at obtaining jobs commensurate with their educational qualifications despite relatively few holding advanced degree, but on average this group had resided in the U.S. the longest. Graduates with business-related degrees continued to lag behind those in other degree fields and experienced lower employability and higher underemployment. Despite their initial employment disadvantage, these degree holders were less likely to pursue continuing education or receive additional U.S. school/educational credits. The findings of this thesis provide insight into the employability of Philippine graduates. Because of the sampling restrictions, the findings cannot be extrapolated beyond the scope of this research. These results should only be treated as indicative within the context of this research. However, they provide useful insights for policy-makers, stakeholders and academics in the Philippines.
APA, Harvard, Vancouver, ISO, and other styles
7

Lindegren, Daniel. "Designing for user awareness and usability : An evaluation of authorization dialogs on a mobile device." Thesis, Karlstads universitet, Handelshögskolan, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-62731.

Full text
Abstract:
Personal data is often disclosed with every registration, sharing, or request of an online service. With the increased usage of things connected to the Internet, users' information being collected and stored, the risks related to unknowingly sharing personal data increases. Sharing of personal information is a sensitive subject and can hurt people’s assets, dignity, personal integrity and other social aspects. In general, users’ concerns have grown regarding protecting their personal information which has led to the development of multiple privacy-oriented systems. In scenarios where users are logging onto a website or system, they rarely notice, understand or have desire to read the conditions to which they are implicitly agreeing. These systems are often referred to as identity management systems or single sign-on systems. Recent studies have shown that users are not aware of what data transactions take place by using various authentication solutions. It is critical for these types of system dealing with privacy that researchers examine users' understanding of the concepts through interface design. The purpose of this study is to investigate the usability and user awareness of data transactions for identity management systems on mobile devices by constructing and evaluating different design concepts. Therefore, four different mobile prototypes were designed (called CREDENTIAL Wallet) and explored to measure the usability and also the user awareness of users’ disclosures. 20 usability tests were conducted per prototype. Multiple conclusions can be drawn from this study. The findings showed that the drag-and-drop prototype scored a high user awareness score in terms of participants remembering their shared data and having a good idea of them not sharing more data than they had actually shared. Consequently, the drag-and-drop prototype achieved the highest usability result. A prototype that utilized swiping was created to fit the mobile medium. The prototype showed the highest user awareness score in the context of participants stating what data they had shared. However, people using the swiping prototype thought they were sharing more data than they actually were. Data show that users have an incorrect mental model of the sharing of their fingerprint pattern. Finally, the writing concerns recommendations and challenges of identity management systems – e.g. the importance of tutorial screens. Future studies within the CREDENTIAL project are already underway concerning users' incorrect mental model of sharing fingerprint to the service provider side.
CREDENTIAL
APA, Harvard, Vancouver, ISO, and other styles
8

Bauer, David Allen. "Preserving privacy with user-controlled sharing of verified information." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/31676.

Full text
Abstract:
Thesis (Ph.D)--Electrical and Computer Engineering, Georgia Institute of Technology, 2010.
Committee Chair: Blough, Douglas; Committee Member: Ahamad, Mustaque; Committee Member: Liu, Ling; Committee Member: Riley, George; Committee Member: Yalamanchili, Sudha. Part of the SMARTech Electronic Thesis and Dissertation Collection.
APA, Harvard, Vancouver, ISO, and other styles
9

Noroozi, Hamid. "A Cloud-native Vehicular Public Key Infrastructure : Towards a Highly-available and Dynamically- scalable VPKIaaS." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-300658.

Full text
Abstract:
Efforts towards standardization of Vehicular Communication Systems (VCSs) have been conclusive on the use of Vehicular Public-Key Infrastructure (VPKI) for the establishment of trust among network participants. Employing VPKI in Vehicular Communication (VC) guarantees the integrity and authenticity of Cooperative Awareness Messages (CAMs) and Decentralized Environmental Notification Messages (DENMs). It also offers a level of privacy for vehicles as VPKI provides them with a set of non-linkable short-lived certificates, called pseudonyms, which are used to sign outgoing messages by vehicles while they communicate with other vehicles referred to as Vehicle-to-Vehicle (V2V) or Roadside Units (RSUs) referred to as Vehicle-to-Infrastructure (V2I). Each vehicle uses a pseudonym for its lifetime and by switching to a not- previously- used pseudonym, it continues to communicate without risking its privacy. There have been two approaches suggested by the literature on how to provide vehicles with pseudonyms. One is the so-called pre-loading mode, suggesting to pre-load vehicles with all pseudonyms they need, which increases the cost of revocation in case they are compromised. The other one is the on-demand mode, suggesting a real-time offering of pseudonyms by VPKI at vehicles request e.g., on starting each trip. Choosing the on-demand approach imposes a considerable burden of availability and resilience on VPKI services. In this work, we are confronting the problems regarding a large-scale deployment of an on-demand VPKI that is resilient, highly available, and dynamically scalable. In order to achieve that, by leveraging state-of-the-art tools and design paradigms, we have enhanced a VPKI system to ensure that it is capable of meeting enterprise-grade Service Level Agreement (SLA) in terms of availability, and it can also be cost-efficient as services can dynamically scale-out in the presence of high load, or possibly scale-in when facing less demand. That has been made possible by re-architecting and refactoring an existing VPKI into a cloud-native solution deployed as microservices. Towards having a reliable architecture based on distributed microservices, one of the key challenges to deal with is Sybil-based misbehavior. By exploiting Sybil-based attacks in VPKI, malicious vehicles can gain influential advantage in the system, e.g., one can affect the traffic to serve its own will. Therefore, preventing the occurrence of Sybil attacks is paramount. On the other hand, traditional approaches to stop them, often come with a performance penalty as they verify requests against a relational database which is a bottleneck of the operations. We propose a solution to address Sybil-based attacks, utilizing Redis, an in-memory data store, without compromising the system efficiency and performance considerably. Running our VPKI services on Google Cloud Platform (GCP) shows that a large-scale deployment of VPKI as a Service (VPKIaaS) can be done efficiently. Conducting various stress tests against the services indicates that the VPKIaaS is capable of serving real world traffic. We have tested VPKIaaS under synthetically generated normal traffic flow and flash crowd scenarios. It has been shown that VPKIaaS managed to issue 100 pseudonyms per request, submitted by 1000 vehicles where vehicles kept asking for a new set of pseudonyms every 1 to 5 seconds. Each vehicle has been served in less than 77 milliseconds. We also demonstrate that, under a flash crowd situation, with 50000 vehicles, VPKIaaS dynamically scales out, and takes ≈192 milliseconds to serve 100 pseudonyms per request submitted by vehicles.
Ansträngningar för standardisering av Vehicular Communication Systems har varit avgörande för användandet av Vehicular Public-Key Infrastructure (VPKI) för att etablera förtroende mellan nätverksdeltagare. Användande av VPKI i Vehicular Communication (VC) garanterar integritet och autenticitet av meddelanden. Det erbjuder ett lager av säkerhet för fordon då VPKI ger dem en mängd av icke länkbara certifikat, kallade pseudonym, som används medan de kommunicerar med andra fordon, kallat Vehicle-to-Vehicle (V2V) eller Roadside Units (RSUs) kallat Vehicle-to-Infrastructure (V2I). Varje fordon använder ett pseudonym under en begränsad tid och genom att byta till ett icke tidigare använt pseudonym kan det fortsätta kommunicera utan att riskera sin integritet. I litteratur har två metoder föreslagits för hur man ska ladda fordon med pseudonym de behöver. Den ena metoden det så kallade offline-läget, som proponerar att man för-laddar fordonen med alla pseudonym som det behöver vilket ökar kostnaden för revokering i fall de blir komprometterat. Den andra metoden föreslår ett on-demand tillvägagångssätt som erbjuder pseudonym via VPKI på fordonets begäran vid början av varje färd. Valet av på begäran metoden sätter en stor börda på tillgänglighet och motståndskraft av VPKI tjänster. I det här arbetet, möter vi problem med storskaliga driftsättningar av en på begäran VPKI som är motståndskraftig, har hög tillgänglighet och dynamiskt skalbarhet i syfte att uppnå dessa attribut genom att nyttja toppmoderna verktyg och designparadigmer. Vi har förbättrat ett VPKI system för att säkerställa att det är kapabelt att möta SLA:er av företagsklass gällande tillgänglighet och att det även kan vara kostnadseffektivt eftersom tjänster dynamiskt kan skala ut vid högre last eller skala ner vid lägre last. Detta har möjliggjorts genom att arkitekta om en existerande VPKI till en cloud-native lösning driftsatt som mikrotjänster. En av nyckelutmaningarna till att ha en pålitlig arkitektur baserad på distribuerade mikrotjänster är sybil-baserad missuppförande. Genom att utnyttja Sybil baserade attacker på VPKI, kan illvilliga fordon påverka trafik att tjäna dess egna syften. Därför är det av största vikt att förhindra Sybil attacker. Å andra sidan så dras traditionella metoder att stoppa dem med prestandakostnader. Vi föreslår en lösning för att adressera Sybilbaserade attacker genom att nyttja Redis, en in-memory data-store utan att märkbart kompromissa på systemets effektivitet och prestanda. Att köra våra VPKI tjänster på Google Cloud Platform (GCP) och genomföra diverse stresstester mot dessa har visat att storskaliga driftsättningar av VPKI as a Service (VPKIaaS) kan göras effektivt samtidigt som riktigt trafik hanteras. Vi har testat VPKIaaS under syntetisk genererat normalt trafikflöde samt flow och flash mängd scenarier. Det har visat sig att VPKIaaS klarar att utfärda 100 pseudonym per förfråga utsänt av 1000 fordon (där fordonen bad om en ny uppsättning pseudonym varje 1 till 5 sekunder), och varje fordon fått svar inom 77 millisekunder. Vi demonstrerar även att under en flashcrowd situation, där antalet fordon höjs till 50000 med en kläckningsgrad på 100. VPKIaaS dynamiskt skalar ut och tar ≈192 millisekunder att betjäna 100 pseudonymer per förfrågan gjord av fordon.
APA, Harvard, Vancouver, ISO, and other styles
10

Thummala, Vamsidhar. "SAFE: A Declarative Trust-Agile System with Linked Credentials." Diss., 2016. http://hdl.handle.net/10161/12236.

Full text
Abstract:

Secure Access For Everyone (SAFE), is an integrated system for managing trust

using a logic-based declarative language. Logical trust systems authorize each

request by constructing a proof from a context---a set of authenticated logic

statements representing credentials and policies issued by various principals

in a networked system. A key barrier to practical use of logical trust systems

is the problem of managing proof contexts: identifying, validating, and

assembling the credentials and policies that are relevant to each trust

decision.

SAFE addresses this challenge by (i) proposing a distributed authenticated data

repository for storing the credentials and policies; (ii) introducing a

programmable credential discovery and assembly layer that generates the

appropriate tailored context for a given request. The authenticated data

repository is built upon a scalable key-value store with its contents named by

secure identifiers and certified by the issuing principal. The SAFE language

provides scripting primitives to generate and organize logic sets representing

credentials and policies, materialize the logic sets as certificates, and link

them to reflect delegation patterns in the application. The authorizer fetches

the logic sets on demand, then validates and caches them locally for further

use. Upon each request, the authorizer constructs the tailored proof context

and provides it to the SAFE inference for certified validation.

Delegation-driven credential linking with certified data distribution provides

flexible and dynamic policy control enabling security and trust infrastructure

to be agile, while addressing the perennial problems related to today's

certificate infrastructure: automated credential discovery, scalable

revocation, and issuing credentials without relying on centralized authority.

We envision SAFE as a new foundation for building secure network systems. We

used SAFE to build secure services based on case studies drawn from practice:

(i) a secure name service resolver similar to DNS that resolves a name across

multi-domain federated systems; (ii) a secure proxy shim to delegate access

control decisions in a key-value store; (iii) an authorization module for a

networked infrastructure-as-a-service system with a federated trust structure

(NSF GENI initiative); and (iv) a secure cooperative data analytics service

that adheres to individual secrecy constraints while disclosing the data. We

present empirical evaluation based on these case studies and demonstrate that

SAFE supports a wide range of applications with low overhead.


Dissertation
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Credentials Management"

1

Sheff, Richard A. Credentials committee: Essentials handbook. Danvers, MA: HCPro, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

United States. Department of Homeland Security. Office of Inspector General. FEMA's progress in implementing employee credentials. Washington, DC: Department of Homeland Security, Office of Inspector General, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

William, Dutcher, Khan Jamil, and National Institute of Standards and Technology (U.S.), eds. An ontology of identity credentials. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

1940-, Kohl Kay Jordan, and LaPidus Jules B, eds. Postbaccalaureate futures: New markets, resources, credentials. Phoenix, Ariz: Oryx Press, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Colorado. Dept. of Regulatory Agencies. Office of Policy, Research, and Regulatory Reform. 2007 sunset review, Air Quality Science Advisory Board: Dynamic Modeling Advisory Committee : Forest Restoration Pilot Program, Technical Advisory Panel : Health Care Credentials Application Review Committee. [Denver, Colo.]: Colorado Department of Regulatory Agencies, Office of Policy, Research and Regulatory Reform, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Association, International Facility Management. Evaluating the Value : International Facility Management Facility Management Credentials: CFM, FMP & SFP Credentials September 2022. International Facility Management Association, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hurtado, Krsten. Engaging Member Companies to Enhance the Value and Perceptions of IFMA Credentials: International Facility Management Association Facility Management Credentials. International Facility Management Association, 2024.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Thomas, Willis H. Basics of Achieving Professional Certification: Enhancing Your Credentials. Productivity Press, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Thomas, Willis H. Basics of Achieving Professional Certification: Enhancing Your Credentials. Taylor & Francis Group, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lukas, Karen Hammerlund. The educational system of the Federal Republic of Germany: A guide for evaluating educational credentials. Additional copies can be ordered from International Education Services of Minnestota, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Credentials Management"

1

Barnes, Robert L. "Competencies, Credentials, Education, and Training." In International Facility Management, 5–38. Oxford: John Wiley & Sons, 2013. http://dx.doi.org/10.1002/9781118771686.ch2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Felkner, Anna, and Adam Kozakiewicz. "Practical Extensions of Trust Management Credentials." In Advances in Intelligent Systems and Computing, 167–80. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-44354-6_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Benson, Glenn, Shiu-Kai Chin, Sean Croston, Karthick Jayaraman, and Susan Older. "Credentials Management for High-Value Transactions." In Lecture Notes in Computer Science, 169–82. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14706-7_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pearson, Siani, and Marco Casassa Mont. "Provision of Trusted Identity Management Using Trust Credentials." In Lecture Notes in Computer Science, 267–82. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11755593_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

van den Broek, Fabian, Brinda Hampiholi, and Bart Jacobs. "Securely Derived Identity Credentials on Smart Phones via Self-enrolment." In Security and Trust Management, 106–21. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46598-2_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bistarelli, Stefano, Fabio Martinelli, Francesco Roperti, and Francesco Santini. "Negotiation of Weighted RTML Credentials on Mobile Devices." In Information Systems: Crossroads for Organization, Management, Accounting and Engineering, 429–38. Heidelberg: Physica-Verlag HD, 2012. http://dx.doi.org/10.1007/978-3-7908-2789-7_47.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wu, Bin, Dengguo Feng, and Meijiao Duan. "Privacy Preserving of Trust Management Credentials Based on Trusted Computing." In Information Security, Practice and Experience, 251–63. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12827-1_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yin, Gang, Huaimin Wang, Jianquan Ouyang, Ning Zhou, and Dianxi Shi. "Towards Role Based Trust Management without Distributed Searching of Credentials." In Information and Communications Security, 222–37. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88625-9_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wästlund, Erik, and Simone Fischer-Hübner. "The Users’ Mental Models’ Effect on their Comprehension of Anonymous Credentials." In Privacy and Identity Management for Life, 233–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-20317-6_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sabouri, Ahmad. "On the User Acceptance of Privacy-Preserving Attribute-Based Credentials – A Qualitative Study." In Data Privacy Management and Security Assurance, 130–45. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47072-6_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Credentials Management"

1

Romasanta, Joan Katherine N., and Marlon A. Diloy. "Micro-Credentials : Educator's Perspective." In 2024 5th Technology Innovation Management and Engineering Science International Conference (TIMES-iCON), 1–4. IEEE, 2024. http://dx.doi.org/10.1109/times-icon61890.2024.10630712.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Herbke, Patrick, Anish Sapkota, and Sid Lamichhane. "Lifecycle Management of Resumés with Decentralized Identifiers and Verifiable Credentials." In 2024 6th Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), 1–3. IEEE, 2024. http://dx.doi.org/10.1109/brains63024.2024.10732402.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lunesu, Maria Ilaria, Andrea Pinna, Riccardo Lai, and Xiaofeng Wang. "Blockchain-Based Verifiable Credentials for Virtual Teams Management in the Metaverse." In 2024 IEEE International Conference on Software Analysis, Evolution and Reengineering - Companion (SANER-C), 64–67. IEEE, 2024. http://dx.doi.org/10.1109/saner-c62648.2024.00013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Byun, SangHyun, Arijet Sarker, Sang-Yoon Chang, and Jugal Kalita. "Blockchain-Based Trust Management in Security Credential Management System for Vehicular Network." In 2025 28th Conference on Innovation in Clouds, Internet and Networks (ICIN), 194–201. IEEE, 2025. https://doi.org/10.1109/icin64016.2025.10942972.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dubini, Simone Pietro, Valentina Balostro, Paolo de Francesco, and Vittorio Colombo. "A Decision Support System for Materials Selection of Well Completion in the Modern Oil and Gas Industry." In CORROSION 2013, 1–14. NACE International, 2013. https://doi.org/10.5006/c2013-02370.

Full text
Abstract:
Abstract This paper describes the improvements of a software program developed for the materials selection of OCTGs and well completion components. The previous version of the program, released in 1998 and presented during 1997 and 2000 NACE Conferences, has been reviewed in terms of technical know-how and information technology to keep up with the modern industry. The most remarkable improvements in the field of technical know-how include the introduction of a number of well completion layouts as well as the management of other types of fluids and well services in addition to reservoir fluids and hydrocarbon production service. Other significant features consist of the development of a pass/fail approach for the selection of CRAs for sour service and the formulation of rules to help the corrosion engineer to select the most suitable test methods and test conditions. Moreover, new materials grades that became available in the last ten years have been added. The improvements in the information technology led also to the development of a new software framework. The new product is a web application, accessible from the company intranet network. It is a shared tool that employees can use, with different levels of authorization, reflecting their own skills and technical competence. Corrosion experts have also the chance to install a “local version” of the software on their laptops and subsequently synchronize all the data with a centralized database. Normal users are allowed limited access to the program functionalities, while users qualified as corrosion experts have the credentials to modify the software basic rules. Administrators can “publish” users’ simulations on a centralized public library. In brief, this paper wants to remark how the concept of “expert system”, born during the late 80s and developed during the 90s, is not out-of-date in the modern industry, but on the contrary, it is still topical and it has changed its shape in the last 20 years thanks to the improvements on information technology and industry know-how.
APA, Harvard, Vancouver, ISO, and other styles
6

Herbke, Patrick, Thomas Cory, and Mauro Migliardi. "Decentralized Credential Status Management: A Paradigm Shift in Digital Trust." In 2024 6th Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), 1–10. IEEE, 2024. http://dx.doi.org/10.1109/brains63024.2024.10732832.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gupta, Harsh S., Khushi S. Kasat, Abhijeet R. Raipurkar, and Praful R. Pardhi. "CredVault: A Credential Management System based on Zero-Knowledge Proofs." In 2024 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS), 1–6. IEEE, 2024. https://doi.org/10.1109/icbds61829.2024.10837111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Alam, Junaid, Binay Kumar Gupta, Ananya Gupta, and S. Maity. "Blockchain-Based Fellowship Management System with Zero-Knowledge Credential Verification." In 2024 13th International Conference on System Modeling & Advancement in Research Trends (SMART), 487–94. IEEE, 2024. https://doi.org/10.1109/smart63812.2024.10882489.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Das, Nabanita, and Subhashis Das. "BCredS: Blockchain Leveraged Secure System for Credential Management in Emergency Scenarios." In 2024 4th International Conference on Computer, Communication, Control & Information Technology (C3IT), 1–6. IEEE, 2024. https://doi.org/10.1109/c3it60531.2024.10829445.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pfeiffer, Alexander, Thomas Wernbacher, Vincent Vella, and Alexiei Dingli. "BLOCKCHAIN IN EDUCATIONAL GAMING: STUDENT PERSPECTIVES ON DIGITAL IDENTITY AND CREDENTIAL MANAGEMENT." In 17th annual International Conference of Education, Research and Innovation, 4925–30. IATED, 2024. https://doi.org/10.21125/iceri.2024.1215.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Credentials Management"

1

Azzutti, Alessio, Mark Cummins, Iain MacNeil, and Chuks Otioma. Simplifying Compliance: The Role of AI and RegTech. University of Glasgow and University of Strathclyde, March 2025. https://doi.org/10.36399/gla.pubs.351604.

Full text
Abstract:
The Financial Regulation Innovation Lab (FRIL) is dedicated to simplifying compliance through emerging technologies, with Artificial Intelligence (AI) representing the latest evolution in regulatory technology (RegTech). Building on previous research and industry engagement—including workshops, blogs, webinars, and a micro-credential course—this White Paper presents key considerations for the conceptualisation, design, and implementation of AI-driven compliance systems. We begin by examining the nature of regulatory rules and the compliance process before exploring the complexities that challenge AI deployment. The discussion then shifts to Generative AI (GenAI) as a cutting-edge innovation, analysing its capabilities and relevance to compliance functions. A focused use case on GenAI in robo-advisory services illustrates AI’s potential in asset management, where conventional AI is already well-established. Finally, we consider the broader organisational implications of AI adoption, emphasising the opportunity to view compliance as an embedded and adaptive function able to evolve and respond to changing stakeholder expectations and regulatory frameworks.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography