Zeitschriftenartikel zum Thema „Identity access management“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Identity access management" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Pol, Mr Vinay Jayprakash. "Identity and Access Management Tools." International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (2019): 796–98. http://dx.doi.org/10.31142/ijtsrd23935.
Der volle Inhalt der QuelleKalwani, Seema. "Identity Access Management, Identity Governance Administration, Privileged Access Management differences, tools and applications." International Journal of Multidisciplinary Research and Growth Evaluation 6, no. 2 (2025): 1832–39. https://doi.org/10.54660/.ijmrge.2025.6.2.1832-1839.
Der volle Inhalt der QuelleHariharan, Ramanan. "AI-Driven Identity and Access Management in Enterprise Systems." International journal of IoT 05, no. 01 (2025): 62–94. https://doi.org/10.55640/ijiot-05-01-05.
Der volle Inhalt der QuelleUddin, Mumina, and David Preston. "Systematic Review of Identity Access Management in Information Security." Journal of Advances in Computer Networks 3, no. 2 (2015): 150–56. http://dx.doi.org/10.7763/jacn.2015.v3.158.
Der volle Inhalt der QuelleCarnley, P. Renee, and Houssain Kettani. "Identity and Access Management for the Internet of Things." International Journal of Future Computer and Communication 8, no. 4 (2019): 129–33. http://dx.doi.org/10.18178/ijfcc.2019.8.4.554.
Der volle Inhalt der QuelleMr., Vinay Jayprakash Pol. "Identity and Access Management Tools." International Journal of Trend in Scientific Research and Development 3, no. 4 (2019): 796–98. https://doi.org/10.31142/ijtsrd23935.
Der volle Inhalt der QuelleVenkata, Soma. "Cloud Identity and Access Management." European Journal of Advances in Engineering and Technology 8, no. 7 (2021): 113–17. https://doi.org/10.5281/zenodo.13762453.
Der volle Inhalt der QuelleKrishnapatnam, Mahendra. "Enhancing Healthcare Security with AI-Driven Identity and Access Management." International Journal of Science and Research (IJSR) 14, no. 2 (2025): 835–38. https://doi.org/10.21275/sr25212205041.
Der volle Inhalt der QuelleKumar, Vikas, and Aashish Bhardwaj. "Identity Management Systems." International Journal of Strategic Decision Sciences 9, no. 1 (2018): 63–78. http://dx.doi.org/10.4018/ijsds.2018010105.
Der volle Inhalt der QuelleJin, Qiang, and Deren Kudeki. "Identity and Access Management for Libraries." Technical Services Quarterly 36, no. 1 (2019): 44–60. http://dx.doi.org/10.1080/07317131.2018.1532056.
Der volle Inhalt der QuelleFuchs, Ludwig, and Günther Pernul. "Qualitätssicherung im Identity- und Access Management." HMD Praxis der Wirtschaftsinformatik 50, no. 1 (2013): 88–97. http://dx.doi.org/10.1007/bf03340780.
Der volle Inhalt der QuellePawar, Pratik. "KeyHound - Identity Provider and Access Management." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem30444.
Der volle Inhalt der QuellePhanireddy, Sandeep. "AI-Driven Identity Access Management (IAM)." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 05, no. 06 (2021): 1–9. https://doi.org/10.55041/ijsrem8931.
Der volle Inhalt der QuelleMartin, Luther. "Identity-based Encryption: From Identity and Access Management to Enterprise Privacy Management." Information Systems Security 16, no. 1 (2007): 9–14. http://dx.doi.org/10.1080/10658980601051268.
Der volle Inhalt der QuelleTalluri, Sampath. "Salesforce Integration Using Identity and Access Management (IAM) Tools Like Saviynt." International Journal of Science and Research (IJSR) 11, no. 8 (2022): 1482–87. http://dx.doi.org/10.21275/sr231116142322.
Der volle Inhalt der QuelleRamakrishnan, Shanmugavelan. "Cloud Identity Mastery: Overcoming Access Management Challenges in the Digital Ether." International Journal of Science and Research (IJSR) 10, no. 11 (2021): 1506–15. http://dx.doi.org/10.21275/sr24314025433.
Der volle Inhalt der QuelleReddy Gopireddy, Satheesh. "Strengthening Identity and Access Management in Cloud DevSecOps: Strategies and Tools." International Journal of Science and Research (IJSR) 8, no. 6 (2019): 2454–56. http://dx.doi.org/10.21275/sr19629111757.
Der volle Inhalt der QuelleWaleed, A. Alamri, and K. Almadani Abdullah. "Identity and Access Management (IAM) Processes and controls Automation." International Journal of Computer Science and Information Technology Research 10, no. 3 (2022): 5–7. https://doi.org/10.5281/zenodo.6806491.
Der volle Inhalt der QuelleSaloni Kumari. "Identity and access management: "Elevating security and efficiency: Unveiling the crucial aspects of identity and access management”." International Journal of Engineering & Technology 12, no. 1 (2023): 11–14. http://dx.doi.org/10.14419/ijet.v12i1.32333.
Der volle Inhalt der QuelleDhamdhere, Mayuri, Shridevi Karande, and Madhura Phatak. "Peer Group Analysis in Identity and Access Management to Identify Anomalies." International Journal of Engineering and Technology 9, no. 3S (2017): 116–21. http://dx.doi.org/10.21817/ijet/2017/v9i3/170903s020.
Der volle Inhalt der QuelleSeshagiri, Asha. "METHODS FOR PREVENTING SQL INJECTION IN IDENTITY AND ACCESS MANAGEMENT (IAM) SYSTEMS." American Journal of Engineering and Technology 6, no. 10 (2024): 17–22. http://dx.doi.org/10.37547/tajet/volume06issue10-03.
Der volle Inhalt der QuelleKunz, Michael, Alexander Puchta, Sebastian Groll, Ludwig Fuchs, and Günther Pernul. "Attribute quality management for dynamic identity and access management." Journal of Information Security and Applications 44 (February 2019): 64–79. http://dx.doi.org/10.1016/j.jisa.2018.11.004.
Der volle Inhalt der QuelleZeel, Hiren Shah. "A Survey on Identity and Access Management." International Journal of Innovative Science and Research Technology 7, no. 9 (2022): 1768–71. https://doi.org/10.5281/zenodo.7233056.
Der volle Inhalt der QuelleGoth, G. "Identity management, access specs are rolling along." IEEE Internet Computing 9, no. 1 (2005): 9–11. http://dx.doi.org/10.1109/mic.2005.16.
Der volle Inhalt der QuelleEverett, Cath. "Identity and Access Management: the second wave." Computer Fraud & Security 2011, no. 5 (2011): 11–13. http://dx.doi.org/10.1016/s1361-3723(11)70051-3.
Der volle Inhalt der QuellePratik Jain. "Identity and Access Management in the Cloud." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 1528–35. https://doi.org/10.32628/cseit25112523.
Der volle Inhalt der QuelleBhagyashree, Kumar Mandhare. "Cyber Security and Identity Access Management (IAM)." International Journal of Advance and Applied Research S6, no. 23 (2025): 5–10. https://doi.org/10.5281/zenodo.15119093.
Der volle Inhalt der QuelleVarma, Hardik. "Identity Access Management (IAM), Privilege Access Management (PAM) & Security Operation Center (SOC)." International Journal for Research in Applied Science and Engineering Technology 9, no. 11 (2021): 1460–66. http://dx.doi.org/10.22214/ijraset.2021.39029.
Der volle Inhalt der QuellePriya Anne, Vamsy. "Enhancing Security and Efficiency: A Comprehensive Overview of Identity and Access Management." International Journal of Science and Research (IJSR) 12, no. 8 (2023): 2562–65. http://dx.doi.org/10.21275/sr23087083048.
Der volle Inhalt der QuelleMalipeddi, Anil Kumar. "BEST PRACTICES FOR PRIVILEGED IDENTITY MANAGEMENT AND SESSION MANAGEMENT IN HYBRID ENVIRONMENTS." International Journal of Business Quantitative Economics and Applied Management Research 7, no. 9 (2023): 37–41. https://doi.org/10.5281/zenodo.14633160.
Der volle Inhalt der QuelleCrnic, Josipa. "Access and Identity Management for Libraries: Controlling Access to Online Information." Australian Academic & Research Libraries 46, no. 1 (2015): 64–65. http://dx.doi.org/10.1080/00048623.2014.993451.
Der volle Inhalt der QuelleMaclean, Lesa. "Access and identity management for libraries: Controlling access to online information." Australian Library Journal 64, no. 1 (2015): 57. http://dx.doi.org/10.1080/00049670.2014.988841.
Der volle Inhalt der QuelleLodwick, David. "Access and Identity Management for Libraries: Controlling Access to Online Information." Technical Services Quarterly 32, no. 1 (2014): 112–13. http://dx.doi.org/10.1080/07317131.2015.972909.
Der volle Inhalt der QuelleGunter, Carl, David Liebovitz, and Bradley Malin. "Experience-Based Access Management: A Life-Cycle Framework for Identity and Access Management Systems." IEEE Security & Privacy Magazine 9, no. 5 (2011): 48–55. http://dx.doi.org/10.1109/msp.2011.72.
Der volle Inhalt der QuelleAhmed, Md Rayhan, A. K. M. Muzahidul Islam, Swakkhar Shatabda, and Salekul Islam. "Blockchain-Based Identity Management System and Self-Sovereign Identity Ecosystem: A Comprehensive Survey." IEEE Access 10 (2022): 113436–81. http://dx.doi.org/10.1109/access.2022.3216643.
Der volle Inhalt der QuelleChunduru, Anilkumar, and Sumathy S. "Security strategies for cloud identity management - a study." International Journal of Engineering & Technology 7, no. 2 (2018): 732. http://dx.doi.org/10.14419/ijet.v7i2.10410.
Der volle Inhalt der QuelleAl zoubi, Qusay M., Yousef K. Sanjalawe, and Mohammed Anbar. "An evaluation of identity and access management systems." International Journal of Internet Technology and Secured Transactions 11, no. 1 (2021): 35. http://dx.doi.org/10.1504/ijitst.2021.10035182.
Der volle Inhalt der QuelleDuggal, Ashmeet Kaur, and Meenu Dave Dr. "INTELLIGENT IDENTITY AND ACCESS MANAGEMENT USING NEURAL NETWORKS." Indian Journal of Computer Science and Engineering 12, no. 1 (2021): 47–56. http://dx.doi.org/10.21817/indjcse/2021/v12i1/211201154.
Der volle Inhalt der QuelleDevlekar, Sanket, and Vidyavati Ramteke. "Identity and Access Management: High-level Conceptual Framework." Revista Gestão Inovação e Tecnologias 11, no. 4 (2021): 4885–97. http://dx.doi.org/10.47059/revistageintec.v11i4.2511.
Der volle Inhalt der QuelleSanjalawe, Yousef K., Mohammed Anbar, and Qusay M. Al zoubi. "An evaluation of identity and access management systems." International Journal of Internet Technology and Secured Transactions 11, no. 1 (2021): 35. http://dx.doi.org/10.1504/ijitst.2021.112868.
Der volle Inhalt der QuelleAdhirai, S., Paramjit Singh, and R. P. Mahapatra. "Identity and access management using Boto and JSON." International Journal of Engineering & Technology 7, no. 2.8 (2018): 640. http://dx.doi.org/10.14419/ijet.v7i2.8.10550.
Der volle Inhalt der QuelleJalili, Vahid, Enis Afgan, James Taylor, and Jeremy Goecks. "Cloud bursting galaxy: federated identity and access management." Bioinformatics 36, no. 1 (2019): 1–9. http://dx.doi.org/10.1093/bioinformatics/btz472.
Der volle Inhalt der QuelleS., Devlekar,, and Ramteke, V. "Identity and Access Management: High-level Conceptual Framework." CARDIOMETRY, no. 24 (November 30, 2022): 393–99. http://dx.doi.org/10.18137/cardiometry.2022.24.393399.
Der volle Inhalt der QuelleKifayat, Kashif, Sameeh Abdulghafour Jassim, and Sufyan T. Faraj. "Management of Identity and Access in the Cloud." Journal of University of Anbar for Pure Science 6, no. 2 (2012): 22–33. http://dx.doi.org/10.37652/juaps.2012.63234.
Der volle Inhalt der QuelleGodfrey, Duncan. "Layering identity and access management to disrupt attacks." Network Security 2021, no. 11 (2021): 17–19. http://dx.doi.org/10.1016/s1353-4858(21)00133-1.
Der volle Inhalt der QuelleOluwatosin Oladayo ARAMIDE. "Identity and Access Management (IAM) for IoT in 5G." Open Access Research Journal of Science and Technology 5, no. 2 (2022): 096–108. https://doi.org/10.53022/oarjst.2022.5.2.0043.
Der volle Inhalt der QuelleShukla, Sheetakshi, and Kirti Jain. "Rise of Identity and Access Management with Microsoft Security." International Journal on Advances in Engineering, Technology and Science (IJAETS) 5, no. 1 (2024): 1–7. https://doi.org/10.5281/zenodo.10621038.
Der volle Inhalt der QuelleKylänpää, Markku, and Jarno Salonen. "Combining System Integrity Verification with Identity and Access Management." European Conference on Cyber Warfare and Security 21, no. 1 (2022): 140–49. http://dx.doi.org/10.34190/eccws.21.1.202.
Der volle Inhalt der QuelleDivyabharathi D. N. and Nagaraj G. Cholli. "A Review on Identity and Access Management Server (KeyCloak)." International Journal of Security and Privacy in Pervasive Computing 12, no. 3 (2020): 46–53. http://dx.doi.org/10.4018/ijsppc.2020070104.
Der volle Inhalt der QuellePremsai, Ranga. "Enhancing Cybersecurity through Advanced Identity and Access Management Solutions." Journal of Artificial Intelligence, Machine Learning and Data Science 1, no. 1 (2023): 1831–37. https://doi.org/10.51219/jaimld/ranga-premsai/406.
Der volle Inhalt der Quelle