Journal articles on the topic 'LDAP directory'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'LDAP directory.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Rajesh, Shah &. Maya Rathore. "PREVENTING LDAP INJECTION FROM MALICIOUS ATTACKS." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES [FRTSSDS-18] (June 13, 2018): 52–55. https://doi.org/10.5281/zenodo.1288417.
Full textLi, Lei, Vijay Vaishnavi, and Art Vandenberg. "SOM Clustering to Promote Interoperability of Directory Metadata: A Grid-Enabled Genetic Algorithm Approach." JUCS - Journal of Universal Computer Science 16, no. (5) (2010): 800–820. https://doi.org/10.3217/jucs-016-05-0800.
Full textRajendraprasad, Chittimalla. "Mandating LDAP Authentication for Internal Applications: A Robust Solution to Cybersecurity Risks." Journal of Scientific and Engineering Research 5, no. 8 (2018): 165–70. https://doi.org/10.5281/zenodo.13472861.
Full textRajendraprasad, Chittimalla. "Mandating LDAP Authentication for Internal Applications: A Robust Solution to Cybersecurity Risks." Journal of Scientific and Engineering Research 5, no. 8 (2018): 165–70. https://doi.org/10.5281/zenodo.13472861.
Full textRajendraprasad, Chittimalla. "Mandating LDAP Authentication for Internal Applications: A Robust Solution to Cybersecurity Risks." Journal of Scientific and Engineering Research 5, no. 8 (2018): 165–70. https://doi.org/10.5281/zenodo.13472861.
Full textRajendraprasad, Chittimalla. "Mandating LDAP Authentication for Internal Applications: A Robust Solution to Cybersecurity Risks." Journal of Scientific and Engineering Research 5, no. 8 (2018): 165–70. https://doi.org/10.5281/zenodo.13472861.
Full textRajendraprasad, Chittimalla. "Mandating LDAP Authentication for Internal Applications: A Robust Solution to Cybersecurity Risks." Journal of Scientific and Engineering Research 5, no. 8 (2018): 165–70. https://doi.org/10.5281/zenodo.13472861.
Full textShahriar, Hossain, Hisham Haddad, and Pranahita Bulusu. "LDAP Vulnerability Detection in Web Applications." International Journal of Secure Software Engineering 8, no. 4 (2017): 31–50. http://dx.doi.org/10.4018/ijsse.2017100102.
Full textKurnianto, Agung, Danang Haryo Sulaksono, and Andy Rachman. "PENERAPAN SINGLE SIGN ON (SSO) PADA KEAMANAN JARINGAN DENGAN METODE LIGHTWEIGHT DIRECTORY ACCESS PROTOCOL (LDAP) DI PT UNICHEM." KERNEL: Jurnal Riset Inovasi Bidang Informatika dan Pendidikan Informatika 3, no. 1 (2022): 20–26. http://dx.doi.org/10.31284/j.kernel.2022.v3i1.2045.
Full textWu, Zhi Yuan, Wei Ping Huang, and Lei Yu. "Design and Implementation of Unified Identity Authentication System Based on LDAP in Digital Campus." Advanced Materials Research 912-914 (April 2014): 1213–17. http://dx.doi.org/10.4028/www.scientific.net/amr.912-914.1213.
Full textDokshin, A. D., M. M. Kovtsur, S. V. Prudnikov, and A. I. Targonskaya. "RESEARCH OF APPROACHES FOR AUTHENTICATION OF WIRELESS NETWORK USERS USING VARIOUS LDAP SOLUTIONS." H&ES Research 13, no. 3 (2021): 28–35. http://dx.doi.org/10.36724/2409-5419-2021-13-3-28-35.
Full textUdayana, I. Putu Agus Eka Darma. "Integrasi Sistem Single Sign On Pada Sistem Informasi Akademik, Web Information System Dan Learning Management System Berbasis Central Authentication Service." Jurnal RESISTOR (Rekayasa Sistem Komputer) 1, no. 1 (2018): 48–54. http://dx.doi.org/10.31598/jurnalresistor.v1i1.265.
Full textMing, Jing Wei. "Research of Unified Authentication System Based on LDAP." Advanced Materials Research 756-759 (September 2013): 2163–67. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.2163.
Full textYerusalem, Muhammad Rozi, Adian Fatchur Rochim, and Kurniawan Teguh Martono. "Desain dan Implementasi Sistem Pembelajaran Jarak Jauh Di Program Studi Sistem Komputer." Jurnal Teknologi dan Sistem Komputer 3, no. 4 (2015): 481. http://dx.doi.org/10.14710/jtsiskom.3.4.2015.481-492.
Full textMaričić, Aleksandar. "INTEROPERABILNI ADAPTER ZA RAD SA LDAP SISTEMIMA." Zbornik radova Fakulteta tehničkih nauka u Novom Sadu 35, no. 06 (2020): 1146–49. http://dx.doi.org/10.24867/08be35maricic.
Full textMuchtar, Farkhana, Ajibade Lukuman Saheed, Mohd Helmy Abd Wahab, and Syed Zulkarnain Syed Idrus. "Query Operation in Trader Service: LDAP Directory versus Database." IOP Conference Series: Materials Science and Engineering 917 (September 22, 2020): 012052. http://dx.doi.org/10.1088/1757-899x/917/1/012052.
Full textShukla, Shridhar, and Anand Deshpande. "LDAP directory services- just another database application? (tutorial session)." ACM SIGMOD Record 29, no. 2 (2000): 580. http://dx.doi.org/10.1145/335191.335482.
Full textНаталья, С. К., А. Ш. Вячеслав, А. Г. Александр, Н. М. Виталий та Е. Л. Артем. "Централизованная система аутентификации в распределенной среде медицинских систем". Scientific works of KubSTU, № 1 (28 квітня 2025): 174–88. https://doi.org/10.26297/2312-9409.2025.1.1.
Full textMuttaqin, Ahmad Herdinal, Adian Fatchur Rochim, and Eko Didik Widianto. "Sistem Autentikasi Hotspot Menggunakan LDAP dan Radius pada Jaringan Internet Wireless Prodi Teknik Sistem Komputer." Jurnal Teknologi dan Sistem Komputer 4, no. 2 (2016): 282. http://dx.doi.org/10.14710/jtsiskom.4.2.2016.282-288.
Full textLiu, Huan. "Study on Coordination of Heterogeneous Databases." Applied Mechanics and Materials 608-609 (October 2014): 336–42. http://dx.doi.org/10.4028/www.scientific.net/amm.608-609.336.
Full textJianghua Liang, V. K. Vaishnavi, and A. Vandenberg. "Clustering of LDAP directory schemas to facilitate information resources interoperability across organizations." IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans 36, no. 4 (2006): 631–42. http://dx.doi.org/10.1109/tsmca.2005.851277.
Full textSonpipare, Rohan. "Online Examination System." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (2022): 1599–605. http://dx.doi.org/10.22214/ijraset.2022.42596.
Full textGoel, Aviral, and Yogachandran Rahulamathavan. "A Comparative Survey of Centralised and Decentralised Identity Management Systems: Analysing Scalability, Security, and Feasibility." Future Internet 17, no. 1 (2024): 1. https://doi.org/10.3390/fi17010001.
Full textYin, Zhen, and Scott Uk-Jin Lee. "Security Analysis of Web Open-Source Projects Based on Java and PHP." Electronics 12, no. 12 (2023): 2618. http://dx.doi.org/10.3390/electronics12122618.
Full textDivyabharathi D. N. and Nagaraj G. Cholli. "A Review on Identity and Access Management Server (KeyCloak)." International Journal of Security and Privacy in Pervasive Computing 12, no. 3 (2020): 46–53. http://dx.doi.org/10.4018/ijsppc.2020070104.
Full textRahmad, Gunawan, Ab Ghani Hadhrami, Khamis Nurulaqilla, Al Amien Januar, and Ismanto Edi. "Deep learning approach to DDoS attack with imbalanced data at the application layer." TELKOMNIKA 21, no. 05 (2023): 1060–67. https://doi.org/10.12928/telkomnika.v21i5.24857.
Full textStaebler, Reinhard M., Bryan J. Miller, Paul J. Rakow, and Thomas Koch. "Connector Architecture for Computer-Assisted Design and Manufacturing Systems." Journal of Ship Production 20, no. 04 (2004): 262–68. http://dx.doi.org/10.5957/jsp.2004.20.4.262.
Full textKerta, Johan Muliadi, Panji Adiprabowo, Eva Kusmiyati, and Sylvia Astri Wulandari Rahardjo. "Penggunaan Single Sign On (SSO) pada Jaringan Internet Badan Pengkajian dan Penerapan Teknologi (BPPT)." ComTech: Computer, Mathematics and Engineering Applications 2, no. 2 (2011): 880. http://dx.doi.org/10.21512/comtech.v2i2.2838.
Full textZaman, Shanza, Imran Ahmad, Nazish Waqar, Ayesha Javed, Fakhra Bashir, and Sehrish Munir. "Bridging Bridging Gaps in Active Directory Security: Threat Landscape, Limitations, and Future-Proof Solutions." International Journal for Electronic Crime Investigation 9, no. 1 (2025): 1–21. https://doi.org/10.54692/ijeci.2025.0901/245.
Full textMUPPA, Kaushik Reddy. "Enhanced Identity and Access Management with Artificial Intelligence: A Strategic Overview." International Journal of Information Security and Cybercrime 13, no. 2 (2024): 9–17. https://doi.org/10.19107/ijisc.2024.02.01.
Full textRasooli, Abdul Qadeer, Khan Mohammad Habibi, and Sahnosh Rahguzar. "INTEGRATION OF APPLICATION LAYER SERVICES WITH CENTRAL AUTHENTICATION SERVER IN EXAMPLE OF HTTP AND FTP RESTRICTION." ZONAsi: Jurnal Sistem Informasi 4, no. 1 (2022): 1–17. http://dx.doi.org/10.31849/zn.v4i1.8668.
Full textFragkos, Georgios, Jay Johnson, and Eirini Eleni Tsiropoulou. "Centralized and Decentralized Distributed Energy Resource Access Control Implementation Considerations." Energies 15, no. 17 (2022): 6375. http://dx.doi.org/10.3390/en15176375.
Full textMejía Viteri, José Teodoro, María Isabel Gonzáles Valero, and Angel Rafael España León. "Gestión de Usuarios Con LDAP (Lightweight Directory Access Protocol) para el Acceso a los Servicios Tecnológicos y a la Información en las Empresas." Journal of Science and Research: Revista Ciencia e Investigación 1, CITT2016 (2016): 10–15. http://dx.doi.org/10.26910/issn.2528-8083vol1isscitt2016.2016pp10-15.
Full textJean, Kamanga Kamono,, Kankolongo Mulumba, Godelive, Ilunga Meji, Erick, and Kalala Kayembe, Barthelemy. "Enhanced Algorithm for Modular Isomorphism Problem Resolution in Small Group Orders." international journal of mathematics and computer research 12, no. 03 (2024): 4073–90. http://dx.doi.org/10.47191/ijmcr/v12i3.01.
Full textKamanga, Kamono Jean, Mulumba Godelive Kankolongo, Meji Erick Ilunga, and Kayembe Barthelemy Kalala. "Study of Securing A Wireless Network with A Radius Server." International Journal Of Mathematics And Computer Research 12, no. 03 (2024): 4073–90. https://doi.org/10.5281/zenodo.10821639.
Full textChua, Chong Chyn, John Reynolds, Anoop Kumar Enjeti, et al. "An Australasian Leukemia Lymphoma Group (ALLG) Phase 2 Study to Investigate Novel Triplets to Extend Remission with Venetoclax in Elderly (INTERVENE) Acute Myeloid Leukemia." Blood 138, Supplement 1 (2021): 368. http://dx.doi.org/10.1182/blood-2021-149488.
Full textMussai, Francis J., Ian Thomas, Cono Ariti, et al. "A Randomised Evaluation of Low-Dose Ara-C Plus BCT-100 Versus Low Dose Ara-C in Older Patients with Acute Myeloid Leukaemia: Results from the LI-1 Trial." Blood 138, Supplement 1 (2021): 2355. http://dx.doi.org/10.1182/blood-2021-148323.
Full textTiong, Ing S., Sun Loo, Emad Uddin Abro, et al. "A Prospective Phase 2 Study of Venetoclax and Low Dose Ara-C (VALDAC) to Target Rising Molecular Measurable Residual Disease and Early Relapse in Acute Myeloid Leukemia." Blood 138, Supplement 1 (2021): 1261. http://dx.doi.org/10.1182/blood-2021-152583.
Full textPratz, Keith W., Andrew H. Wei, Daniel A. Pollyea, et al. "Management of Neutropenia during Venetoclax-Based Combination Treatment in Patients with Newly Diagnosed Acute Myeloid Leukemia." Blood 134, Supplement_1 (2019): 3897. http://dx.doi.org/10.1182/blood-2019-127423.
Full textCortes, Jorge E., Akil Merchant, Catriona Jamieson, et al. "Biomarkers of Overall Survival and Response to Glasdegib and Intensive or Non-Intensive Chemotherapy in Patients with Acute Myeloid Leukemia." Blood 132, Supplement 1 (2018): 2733. http://dx.doi.org/10.1182/blood-2018-99-111239.
Full textMaertens, Johan, Michael Lübbert, Walter Fiedler, et al. "Phase I/II Study of Volasertib (BI 6727), an Intravenous Polo-Like Kinase (Plk) Inhibitor, in Patients with Acute Myeloid Leukemia (AML): Results From the Randomized Phase II Part for Volasertib in Combination with Low-Dose Cytarabine (LDAC) Versus LDAC Monotherapy in Patients with Previously Untreated AML Ineligible for Intensive Treatment." Blood 120, no. 21 (2012): 411. http://dx.doi.org/10.1182/blood.v120.21.411.411.
Full textZeidan, Amer M., Michael W. Schuster, Jürgen Krauter, et al. "Clinical Benefit of Glasdegib in Combination with Azacitidine or Low-Dose Cytarabine in Patients with Acute Myeloid Leukemia." Blood 134, Supplement_1 (2019): 3916. http://dx.doi.org/10.1182/blood-2019-124034.
Full textLoges, Sonja, Michael Heuser, Jörg Chromik, et al. "The Combination of AXL Inhibitor Bemcentinib and Low Dose Cytarabine Is Well Tolerated and Efficacious in Elderly Relapsed AML Patients: Update from the Ongoing BGBC003 Phase II Trial (NCT02488408)." Blood 136, Supplement 1 (2020): 14. http://dx.doi.org/10.1182/blood-2020-136566.
Full textTiong, Ing S., Richard Dillon, Adam Ivey, et al. "Rapid Elimination of NPM1 Mutant Measurable Residual Disease (MRD) Using Low Intensity Venetoclax-Based Combinations in Acute Myeloid Leukemia (AML)." Blood 134, Supplement_1 (2019): 2648. http://dx.doi.org/10.1182/blood-2019-123899.
Full textSwaminathan, Mahesh, Hagop M. Kantarjian, Naval Daver, et al. "The Combination of Quizartinib with Azacitidine or Low Dose Cytarabine Is Highly Active in Patients (Pts) with FLT3-ITD Mutated Myeloid Leukemias: Interim Report of a Phase I/II Trial." Blood 130, Suppl_1 (2017): 723. http://dx.doi.org/10.1182/blood.v130.suppl_1.723.723.
Full textCopland, Mhairi, Cono Ariti, Ian Thomas, et al. "A Randomised Evaluation of Low-Dose Cytarabine Arabinoside Plus Lenalidomide Versus Single-Agent Low-Dose Cytarabine Arabinoside in Older Patients with Acute Myeloid Leukaemia: Results from the LI-1 Trial." Blood 138, Supplement 1 (2021): 1266. http://dx.doi.org/10.1182/blood-2021-147802.
Full textSeymour, John F., Hartmut Döhner, Aleksandra Butrym, et al. "Azacitidine (AZA) Versus Conventional Care Regimens (CCR) in Older Patients with Newly Diagnosed Acute Myeloid Leukemia (>30% Bone Marrow Blasts) with Morphologic Dysplastic Changes: A Subgroup Analysis of the AZA-AML-001 Trial." Blood 124, no. 21 (2014): 10. http://dx.doi.org/10.1182/blood.v124.21.10.10.
Full textPratz, Keith W., Courtney D. DiNardo, Martha L. Arellano, et al. "Outcomes after Stem Cell Transplant in Older Patients with Acute Myeloid Leukemia Treated with Venetoclax-Based Therapies." Blood 134, Supplement_1 (2019): 264. http://dx.doi.org/10.1182/blood-2019-127251.
Full textPratz, Keith W., Panayiotis Panayiotidis, Christian Recher, et al. "Delays in Time to Deterioration of Health-Related Quality of Life Were Observed in Patients with Acute Myeloid Leukemia Receiving Venetoclax in Combination with Azacitidine or in Combination with Low-Dose Cytarabine." Blood 136, Supplement 1 (2020): 33–35. http://dx.doi.org/10.1182/blood-2020-133912.
Full textKantarjian, Hagop M., Mikkael A. Sekeres, Vincent Ribrag, et al. "Phase I Study to Assess the Safety and Tolerability of AZD1152 In Combination with Low Dose Cytosine Arabinoside In Patients with Acute Myeloid Leukemia (AML)." Blood 116, no. 21 (2010): 656. http://dx.doi.org/10.1182/blood.v116.21.656.656.
Full text