Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,890,169 papers from all fields of science
Search
Sign In
Create Free Account
Credential service provider
Known as:
CSP
, Credential Service Provider (CSP)
A Credential Service Provider (CSP) is a trusted entity that issues security tokens or electronic credentials to subscribers. A CSP forms part of an…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Authentication
Authentication protocol
Computer security
Credential
Expand
Broader (1)
Federated identity
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Coconut E-Petition Implementation
J. Wahab
arXiv.org
2018
Corpus ID: 52892299
In this dissertation project, we describe and implement a practical system application based on a selective disclosure credential…
Expand
2015
2015
Grit, Endurance, and Determination: Challenges of GED Credential Holders in College, and Factors That Lead to Persistence
H. Fitch
,
M. Linda
2015
Corpus ID: 114305727
2015
2015
Identifying the factors that influenced adult students in persisting to earn the ged credential
Sam May-Varas
2015
Corpus ID: 152108627
2014
2014
The E-mail Attack Vector
R. Ackroyd
2014
Corpus ID: 114292480
2011
2011
Young GED[R] Credential Recipients in the 21st Century: A Snapshot from NLSY97.
Wei-fang Song
,
M. Patterson
2011
Corpus ID: 153481595
Ever since achieving a high school credential by passing the GED Tests became widely institutionalized through the adult…
Expand
2010
2010
Audited Credential Delegation: A Usable Identity Management Solution for Grid Environments
A. Haidar
,
P. V. Coveney
,
+5 authors
Mas Jones
2010
Corpus ID: 268118918
2009
2009
Audited credential delegation: A sensible approach to grid authentication
B. Beckles
,
A. Haidar
,
S. Zasada
,
P. Coveney
5th IEEE International Conference on E-Science…
2009
Corpus ID: 9558212
If the authentication process in a computational grid environment is difficult for end-users, they will either be unable to use…
Expand
2009
2009
An Abductive Protocol for Authorization Credential Gathering in Distributed Systems
Moritz Y. Becker
,
Jason F. Mackay
,
B. Dillaway
2009
Corpus ID: 15776195
The problem of authorization in large-scale decentralized systems has been addressed by a number of logic-based policy languages…
Expand
2008
2008
Economic and Non-Economic Outcomes for GED Recipients
Wei-fang Song
,
Y. Hsu
2008
Corpus ID: 160019699
The GED Tests are widely used to certify a high school level of academic knowledge and skills. The popularity and profound…
Expand
2007
2007
Differences between Students Who Were and Were Not Retained in Grade: A Comparison of Academic Achievement, Reasons for Dropping out, and Reasons for Pursuing a GED[R] Credential. GED Testing Service…
Carol E. George-Ezzelle
,
Wei-fang Song
2007
Corpus ID: 142584004
This study examines the demographic, academic, social, and behavioral differences between GED Tests candidates who were and were…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required