Massachusetts Institute of Technology
Sign in

Session II: Cybersecurity Through an Identity Management System

Elli Androulaki, Maritza Johnson, Binh Vo, Steven Bellovin (Columbia). 10/12/2009

Comments (0)

It looks like no one has posted a comment yet. You can be the first!

You need to log in, in order to post comments.

Engaging Data Forum

Engaging Data Forum

Category: Events | Updated almost 8 years ago

Created
November 23, 2009 12:25
Category
Tags
License
All Rights Reserved (What is this?)
Additional Files


Viewed
15484 times

More from Engaging Data Forum

Plenary Session: Rich Identity and the Next Net

Plenary Session: Rich Identity and ...

Added 8 years ago | 00:28:34 | 25303 views

Session IV: Improving Patient Safety and Hospital Performance Using Simulation Models and Realtime Data Capture Systems: Results from Japanese Hospitals

Session IV: Improving Patient Safet...

Added 8 years ago | 00:14:01 | 19003 views

Panel 3: Summary Discussion

Panel 3: Summary Discussion

Added almost 8 years ago | 01:05:00 | 13916 views

Session I: Designing for Doubt: Citizen Science and the Challenge of Change

Session I: Designing for Doubt: Cit...

Added 8 years ago | 00:14:40 | 10482 views

Session II: Too Public or Too Private?

Session II: Too Public or Too Private?

Added 8 years ago | 00:17:34 | 17389 views

Keynote III

Keynote III

Added 8 years ago | 00:39:27 | 9109 views