Zeitschriftenartikel zum Thema „Identity access management“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Identity access management" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Pol, Mr Vinay Jayprakash. "Identity and Access Management Tools." International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (2019): 796–98. http://dx.doi.org/10.31142/ijtsrd23935.
Der volle Inhalt der QuelleUddin, Mumina, and David Preston. "Systematic Review of Identity Access Management in Information Security." Journal of Advances in Computer Networks 3, no. 2 (2015): 150–56. http://dx.doi.org/10.7763/jacn.2015.v3.158.
Der volle Inhalt der QuelleCarnley, P. Renee, and Houssain Kettani. "Identity and Access Management for the Internet of Things." International Journal of Future Computer and Communication 8, no. 4 (2019): 129–33. http://dx.doi.org/10.18178/ijfcc.2019.8.4.554.
Der volle Inhalt der QuelleKumar, Vikas, and Aashish Bhardwaj. "Identity Management Systems." International Journal of Strategic Decision Sciences 9, no. 1 (2018): 63–78. http://dx.doi.org/10.4018/ijsds.2018010105.
Der volle Inhalt der QuelleJin, Qiang, and Deren Kudeki. "Identity and Access Management for Libraries." Technical Services Quarterly 36, no. 1 (2019): 44–60. http://dx.doi.org/10.1080/07317131.2018.1532056.
Der volle Inhalt der QuelleFuchs, Ludwig, and Günther Pernul. "Qualitätssicherung im Identity- und Access Management." HMD Praxis der Wirtschaftsinformatik 50, no. 1 (2013): 88–97. http://dx.doi.org/10.1007/bf03340780.
Der volle Inhalt der QuellePawar, Pratik. "KeyHound - Identity Provider and Access Management." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem30444.
Der volle Inhalt der QuelleMartin, Luther. "Identity-based Encryption: From Identity and Access Management to Enterprise Privacy Management." Information Systems Security 16, no. 1 (2007): 9–14. http://dx.doi.org/10.1080/10658980601051268.
Der volle Inhalt der QuelleSaloni Kumari. "Identity and access management: "Elevating security and efficiency: Unveiling the crucial aspects of identity and access management”." International Journal of Engineering & Technology 12, no. 1 (2023): 11–14. http://dx.doi.org/10.14419/ijet.v12i1.32333.
Der volle Inhalt der QuelleDhamdhere, Mayuri, Shridevi Karande, and Madhura Phatak. "Peer Group Analysis in Identity and Access Management to Identify Anomalies." International Journal of Engineering and Technology 9, no. 3S (2017): 116–21. http://dx.doi.org/10.21817/ijet/2017/v9i3/170903s020.
Der volle Inhalt der QuelleKunz, Michael, Alexander Puchta, Sebastian Groll, Ludwig Fuchs, and Günther Pernul. "Attribute quality management for dynamic identity and access management." Journal of Information Security and Applications 44 (February 2019): 64–79. http://dx.doi.org/10.1016/j.jisa.2018.11.004.
Der volle Inhalt der QuelleGoth, G. "Identity management, access specs are rolling along." IEEE Internet Computing 9, no. 1 (2005): 9–11. http://dx.doi.org/10.1109/mic.2005.16.
Der volle Inhalt der QuelleEverett, Cath. "Identity and Access Management: the second wave." Computer Fraud & Security 2011, no. 5 (2011): 11–13. http://dx.doi.org/10.1016/s1361-3723(11)70051-3.
Der volle Inhalt der QuelleVarma, Hardik. "Identity Access Management (IAM), Privilege Access Management (PAM) & Security Operation Center (SOC)." International Journal for Research in Applied Science and Engineering Technology 9, no. 11 (2021): 1460–66. http://dx.doi.org/10.22214/ijraset.2021.39029.
Der volle Inhalt der QuelleCrnic, Josipa. "Access and Identity Management for Libraries: Controlling Access to Online Information." Australian Academic & Research Libraries 46, no. 1 (2015): 64–65. http://dx.doi.org/10.1080/00048623.2014.993451.
Der volle Inhalt der QuelleMaclean, Lesa. "Access and identity management for libraries: Controlling access to online information." Australian Library Journal 64, no. 1 (2015): 57. http://dx.doi.org/10.1080/00049670.2014.988841.
Der volle Inhalt der QuelleLodwick, David. "Access and Identity Management for Libraries: Controlling Access to Online Information." Technical Services Quarterly 32, no. 1 (2014): 112–13. http://dx.doi.org/10.1080/07317131.2015.972909.
Der volle Inhalt der QuelleGunter, Carl, David Liebovitz, and Bradley Malin. "Experience-Based Access Management: A Life-Cycle Framework for Identity and Access Management Systems." IEEE Security & Privacy Magazine 9, no. 5 (2011): 48–55. http://dx.doi.org/10.1109/msp.2011.72.
Der volle Inhalt der QuelleAhmed, Md Rayhan, A. K. M. Muzahidul Islam, Swakkhar Shatabda, and Salekul Islam. "Blockchain-Based Identity Management System and Self-Sovereign Identity Ecosystem: A Comprehensive Survey." IEEE Access 10 (2022): 113436–81. http://dx.doi.org/10.1109/access.2022.3216643.
Der volle Inhalt der QuelleChunduru, Anilkumar, and Sumathy S. "Security strategies for cloud identity management - a study." International Journal of Engineering & Technology 7, no. 2 (2018): 732. http://dx.doi.org/10.14419/ijet.v7i2.10410.
Der volle Inhalt der QuelleAl zoubi, Qusay M., Yousef K. Sanjalawe, and Mohammed Anbar. "An evaluation of identity and access management systems." International Journal of Internet Technology and Secured Transactions 11, no. 1 (2021): 35. http://dx.doi.org/10.1504/ijitst.2021.10035182.
Der volle Inhalt der QuelleDuggal, Ashmeet Kaur, and Meenu Dave Dr. "INTELLIGENT IDENTITY AND ACCESS MANAGEMENT USING NEURAL NETWORKS." Indian Journal of Computer Science and Engineering 12, no. 1 (2021): 47–56. http://dx.doi.org/10.21817/indjcse/2021/v12i1/211201154.
Der volle Inhalt der QuelleDevlekar, Sanket, and Vidyavati Ramteke. "Identity and Access Management: High-level Conceptual Framework." Revista Gestão Inovação e Tecnologias 11, no. 4 (2021): 4885–97. http://dx.doi.org/10.47059/revistageintec.v11i4.2511.
Der volle Inhalt der QuelleSanjalawe, Yousef K., Mohammed Anbar, and Qusay M. Al zoubi. "An evaluation of identity and access management systems." International Journal of Internet Technology and Secured Transactions 11, no. 1 (2021): 35. http://dx.doi.org/10.1504/ijitst.2021.112868.
Der volle Inhalt der QuelleAdhirai, S., Paramjit Singh, and R. P. Mahapatra. "Identity and access management using Boto and JSON." International Journal of Engineering & Technology 7, no. 2.8 (2018): 640. http://dx.doi.org/10.14419/ijet.v7i2.8.10550.
Der volle Inhalt der QuelleJalili, Vahid, Enis Afgan, James Taylor, and Jeremy Goecks. "Cloud bursting galaxy: federated identity and access management." Bioinformatics 36, no. 1 (2019): 1–9. http://dx.doi.org/10.1093/bioinformatics/btz472.
Der volle Inhalt der QuelleS., Devlekar,, and Ramteke, V. "Identity and Access Management: High-level Conceptual Framework." CARDIOMETRY, no. 24 (November 30, 2022): 393–99. http://dx.doi.org/10.18137/cardiometry.2022.24.393399.
Der volle Inhalt der QuelleKifayat, Kashif, Sameeh Abdulghafour Jassim, and Sufyan T. Faraj. "Management of Identity and Access in the Cloud." Journal of University of Anbar for Pure Science 6, no. 2 (2012): 22–33. http://dx.doi.org/10.37652/juaps.2012.63234.
Der volle Inhalt der QuelleGodfrey, Duncan. "Layering identity and access management to disrupt attacks." Network Security 2021, no. 11 (2021): 17–19. http://dx.doi.org/10.1016/s1353-4858(21)00133-1.
Der volle Inhalt der QuelleWang, Shangping, Ru Pei, and Yaling Zhang. "EIDM: A Ethereum-Based Cloud User Identity Management Protocol." IEEE Access 7 (2019): 115281–91. http://dx.doi.org/10.1109/access.2019.2933989.
Der volle Inhalt der QuelleKylänpää, Markku, and Jarno Salonen. "Combining System Integrity Verification with Identity and Access Management." European Conference on Cyber Warfare and Security 21, no. 1 (2022): 140–49. http://dx.doi.org/10.34190/eccws.21.1.202.
Der volle Inhalt der QuelleDivyabharathi D. N. and Nagaraj G. Cholli. "A Review on Identity and Access Management Server (KeyCloak)." International Journal of Security and Privacy in Pervasive Computing 12, no. 3 (2020): 46–53. http://dx.doi.org/10.4018/ijsppc.2020070104.
Der volle Inhalt der QuelleFlieder, Karl. "Identity- und Access-Management mit EAI-Konzepten und -Technologien." Datenschutz und Datensicherheit - DuD 32, no. 8 (2008): 532–36. http://dx.doi.org/10.1007/s11623-008-0126-4.
Der volle Inhalt der QuelleGruschka, N., L. Lo Iacono, and H. Rajasekaran. "Identity and access management in multi-institutional medical research." e & i Elektrotechnik und Informationstechnik 127, no. 5 (2010): 143–50. http://dx.doi.org/10.1007/s00502-010-0734-1.
Der volle Inhalt der QuellePöhn, Daniela, and Wolfgang Hommel. "New Directions and Challenges within Identity and Access Management." IEEE Communications Standards Magazine 7, no. 2 (2023): 84–90. http://dx.doi.org/10.1109/mcomstd.0006.2200077.
Der volle Inhalt der QuelleMoreno, Rafael Torres, Jesus Garcia-Rodriguez, Jorge Bernal Bernabe, and Antonio Skarmeta. "A Trusted Approach for Decentralised and Privacy-Preserving Identity Management." IEEE Access 9 (2021): 105788–804. http://dx.doi.org/10.1109/access.2021.3099837.
Der volle Inhalt der QuelleAstorga, Jasone, Marc Barcelo, Aitor Urbieta, and Eduardo Jacob. "How to Survive Identity Management in the Industry 4.0 Era." IEEE Access 9 (2021): 93137–51. http://dx.doi.org/10.1109/access.2021.3092203.
Der volle Inhalt der QuelleFu, Zom Bo, Jian Xin Wang, Lin Yang, Yuan Cao, and Wei Xing Zhu. "Open Problems for Privacy Preservation in Identity Management." Applied Mechanics and Materials 40-41 (November 2010): 652–56. http://dx.doi.org/10.4028/www.scientific.net/amm.40-41.652.
Der volle Inhalt der QuelleNuruliansyah, Hendra. "Penerapan Privileged Access Management Menggunakan One Identity Pada Sebuah Perusahaan." INOVA-TIF 2, no. 1 (2020): 12. http://dx.doi.org/10.32832/inova-tif.v1i2.2750.
Der volle Inhalt der QuelleMonson, Jane. "A Review of “Access and Identity Management for Libraries: Controlling Access to Online Information”." Journal of Electronic Resources Librarianship 26, no. 3 (2014): 228–29. http://dx.doi.org/10.1080/1941126x.2014.939050.
Der volle Inhalt der QuelleSchorer, Craig. "A Review of “Access and Identity Management for Libraries: Controlling Access to Online Information”." Journal of Access Services 11, no. 4 (2014): 327–28. http://dx.doi.org/10.1080/15367967.2014.945294.
Der volle Inhalt der QuelleDirgantara, Dhimas, and Is Mardianto. "TEKNIK IDENTITY AND ACCESS MANAGEMENT PADA LAYANAN AMAZON WEB SERVICES." Computatio : Journal of Computer Science and Information Systems 3, no. 1 (2019): 1. http://dx.doi.org/10.24912/computatio.v3i1.4270.
Der volle Inhalt der QuelleKarim Abdul-Hassan, Alia, and Iman Hasson Hadi. "INTELLIGENT AUTHENTICATION FOR IDENTITY AND ACCESS MANAGEMENT: A REVIEW PAPER." Iraqi Journal for Computers and informatics 45, no. 1 (2019): 6–10. http://dx.doi.org/10.25195/2017/4512.
Der volle Inhalt der QuelleHadi, Iman. "INTELLIGENT AUTHENTICATION FOR IDENTITY AND ACCESS MANAGEMENT: A REVIEW PAPER." Iraqi Journal for Computers and Informatics 45, no. 1 (2019): 6–10. http://dx.doi.org/10.25195/ijci.v45i1.39.
Der volle Inhalt der QuelleAguado Corman, Asier, Daniel Fernández Rodríguez, Maria V. Georgiou, et al. "CERN’s Identity and Access Management: A journey to Open Source." EPJ Web of Conferences 245 (2020): 03012. http://dx.doi.org/10.1051/epjconf/202024503012.
Der volle Inhalt der QuelleSchanzenbach, Martin, and Sebastian Zickau. "Identity and access management in a doping control use case." Datenschutz und Datensicherheit - DuD 41, no. 12 (2017): 724–28. http://dx.doi.org/10.1007/s11623-017-0867-z.
Der volle Inhalt der QuelleRasouli, Hatef, and Changiz Valmohammadi. "Proposing a conceptual framework for customer identity and access management." Global Knowledge, Memory and Communication 69, no. 1/2 (2019): 94–116. http://dx.doi.org/10.1108/gkmc-02-2019-0014.
Der volle Inhalt der QuelleIndu, I., P. M. Rubesh Anand, and Vidhyacharan Bhaskar. "Identity and access management in cloud environment: Mechanisms and challenges." Engineering Science and Technology, an International Journal 21, no. 4 (2018): 574–88. http://dx.doi.org/10.1016/j.jestch.2018.05.010.
Der volle Inhalt der QuelleNikhil Ghadge. "Enhancing threat detection in Identity and Access Management (IAM) systems." International Journal of Science and Research Archive 11, no. 2 (2024): 2050–57. http://dx.doi.org/10.30574/ijsra.2024.11.2.0761.
Der volle Inhalt der QuelleSingla, Ashish, Nakul Gupta, Prageet Aeron, Anshul Jain, Divya Sharma, and Sangeeta Shah Bharadwaj. "Decentralized Identity Management Using Blockchain." Journal of Global Information Management 31, no. 2 (2022): 1–24. http://dx.doi.org/10.4018/jgim.315283.
Der volle Inhalt der Quelle