Academic literature on the topic 'Identity access management'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Identity access management.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Identity access management"

1

Pol, Mr Vinay Jayprakash. "Identity and Access Management Tools." International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (June 30, 2019): 796–98. http://dx.doi.org/10.31142/ijtsrd23935.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Uddin, Mumina, and David Preston. "Systematic Review of Identity Access Management in Information Security." Journal of Advances in Computer Networks 3, no. 2 (2015): 150–56. http://dx.doi.org/10.7763/jacn.2015.v3.158.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Carnley, P. Renee, and Houssain Kettani. "Identity and Access Management for the Internet of Things." International Journal of Future Computer and Communication 8, no. 4 (December 2019): 129–33. http://dx.doi.org/10.18178/ijfcc.2019.8.4.554.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kumar, Vikas, and Aashish Bhardwaj. "Identity Management Systems." International Journal of Strategic Decision Sciences 9, no. 1 (January 2018): 63–78. http://dx.doi.org/10.4018/ijsds.2018010105.

Full text
Abstract:
This article describes how in today's digital world, customers have made it a common practice to maintain user accounts with different service providers to access a range of services. In such environment, all attributes of the identity must be verified to operate, otherwise the resources would be vulnerable to financial and data loss. This article contends that makes it important to form an Identity Management System, which could provide central administration, user self- service, role based access control and integrated user management. Identity Management becomes very much vital for the environment working with multiple technologies, as it governs an entity (i.e. a human or a software agent) to authenticate and authorize for accessing the network via multiple technologies. Successful Identity Management increases the efficiency, security, access control and decreases the complexity, cost and many repetitive works. Essential features of present day identity management systems have been identified in the present work. A comparative analysis of these identity management systems has been carried out to establish the present-day industry practices. Along with that, specific challenges to the present-day identity management systems have been identified. The article helps in the identification of suitable Identity Management System for specific applications.
APA, Harvard, Vancouver, ISO, and other styles
5

Jin, Qiang, and Deren Kudeki. "Identity and Access Management for Libraries." Technical Services Quarterly 36, no. 1 (January 2, 2019): 44–60. http://dx.doi.org/10.1080/07317131.2018.1532056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Fuchs, Ludwig, and Günther Pernul. "Qualitätssicherung im Identity- und Access Management." HMD Praxis der Wirtschaftsinformatik 50, no. 1 (February 2013): 88–97. http://dx.doi.org/10.1007/bf03340780.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Pawar, Pratik. "KeyHound - Identity Provider and Access Management." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (April 9, 2024): 1–5. http://dx.doi.org/10.55041/ijsrem30444.

Full text
Abstract:
Single organization handles multiple applications based on different departments or needs. To access these applications, users must remember the login credentials for each. This results in the data of mutual users being stored in different identity providers, causing data redundancy and indirectly increasing storage costs. Solution is needed to globalize user credentials. Implementing a centralized system aids organizations in saving storage costs by eliminating redundant user data stored across multiple identity providers. Key Words: Identity provider and Management, Access management, Validation, Authorization.
APA, Harvard, Vancouver, ISO, and other styles
8

Martin, Luther. "Identity-based Encryption: From Identity and Access Management to Enterprise Privacy Management." Information Systems Security 16, no. 1 (March 28, 2007): 9–14. http://dx.doi.org/10.1080/10658980601051268.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Saloni Kumari. "Identity and access management: "Elevating security and efficiency: Unveiling the crucial aspects of identity and access management”." International Journal of Engineering & Technology 12, no. 1 (September 6, 2023): 11–14. http://dx.doi.org/10.14419/ijet.v12i1.32333.

Full text
Abstract:
The foundation of the software is the identity and access management system. A fundamental and essential cybersecurity competency is ensuring that the right parties have timely access to the right resources. The IAM has four domains: IAAA stands for identification, authentication, authorization, and accounting, the second is Privileged Access Management (PAM), third-party Identity Governance and Administration, data governance and protection. In this article, the concepts of identification, authentication, authorization, and accounting are discussed, as well as how IAAA works in an online setting.
APA, Harvard, Vancouver, ISO, and other styles
10

Dhamdhere, Mayuri, Shridevi Karande, and Madhura Phatak. "Peer Group Analysis in Identity and Access Management to Identify Anomalies." International Journal of Engineering and Technology 9, no. 3S (July 17, 2017): 116–21. http://dx.doi.org/10.21817/ijet/2017/v9i3/170903s020.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Identity access management"

1

Fryaufová, Lucie. "Řízení identit v organizacích." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-162629.

Full text
Abstract:
The topic of this thesis is focused on the issues of the Identity Management. The author of the work describes the possibilities using this concept and application Identity Management in organizations. This issue is not oriented just from the point of Information security where this area belongs. The goal of this work is to create a framework of the process Identity Management by using best practises and standards. The context of the work should describe new trends and using special tools for safety work with process of Identity Management and the risk in area of the Identity Management. To achieve these goals which are mentioned above is ensured by using analysis of information sources and consulting with professionals from organization. The benefit of this work is provide comparison of teoretical knowledges with practical usage in organization and its recommendation to improve the process Identity Management.
APA, Harvard, Vancouver, ISO, and other styles
2

Jaferian, Pooya. "User-centered design of identity and access management systems." Thesis, University of British Columbia, 2014. http://hdl.handle.net/2429/51243.

Full text
Abstract:
IT security management (ITSM) technologies are important components of IT security in organizations. But there has been little research on how ITSM technologies should incorporate human and social issues into their design. Identity and Access Management (IAM) systems, as an important category of ITSM, share such a gap with other ITSM technologies. The overreaching goal of this research is to narrow the gap between IAM technologies and social context. In the first phase, we developed a set of usability guidelines, and heuristics for design and usability evaluation of ITSM tools. We gathered recommendations related to ITSM tools from the literature, and categorized them into a set of 19 high-level guidelines that can be used by ITSM tool designers. We then used a methodical approach to create seven heuristics for usability evaluation of ITSM tools and named them ITSM heuristics. With a between-subjects study, we compared the usage of the ITSM and Nielsen's heuristics for evaluation of a commercial IAM system. The results confirmed the effectiveness of ITSM heuristics, as participants who used the ITSM heuristics found more problems categorized as severe than those who used Nielsen's. In the second phase, we conducted a field-study of 19 security practitioners to understand how they do IAM and identify the challenges they face. We used a grounded theory approach to collect and analyze data and developed a model of IAM activities and challenges. Built on the model, we proposed a list of recommendations for improving technology or practice. In the third phase, we narrowed down our focus to a specific IAM related activity, access review. We expanded our understanding of access review by further analysis of the interviews, and by conducting a survey of 49 security practitioners. Then, we used a usability engineering process to design AuthzMap, a novel user-interface for reviewing access policies in organizations. We conducted a user study with 430 participants to compare the use of AuthzMap with two existing access review systems. The results show AuthzMap improved the efficiency in five of the seven tested tasks, and improved accuracy in one of them.
Applied Science, Faculty of
Electrical and Computer Engineering, Department of
Graduate
APA, Harvard, Vancouver, ISO, and other styles
3

Kotora, Ondřej. "Centralizovaná správa rolí." Master's thesis, Vysoká škola ekonomická v Praze, 2008. http://www.nusl.cz/ntk/nusl-3371.

Full text
Abstract:
Správa rolí a identit se stává elementární součástí podnikových informačních systémů. Je součástí oboru Identity a Access managementu, který je velmi mladou a dynamicky se rozvíjející tržní oblastí. Tato diplomová práce poskytuje základní přehled o členění této tržní oblasti a zároveň charakterizuje tuto oblast z pohledu obecného přístupu a přístupu na úrovni odvětví. Je zde popsána nabídka několika hlavních hráčů na trhu s důrazem na vhodnost nasazení v českém prostředí. Konkrétně je vybírán vhodný produkt pro nasazení v České správě sociálního zabezpečení, největší finančně správní institucí státní správy ČR. Je zde také popsáno několik faktorů na které by měl být při podobném výběru kladen důraz. Samotný výběr je pouze informativní s účelem dodat aktuální přehled o možnostech řešení, které trh pro danou oblast nabízí. Identity a Access management totiž v České správě sociálního zabezpečení již zaveden byl. O tomto řešení se zmiňuje předposlední kapitola.
APA, Harvard, Vancouver, ISO, and other styles
4

Rhermini, Siham. "Identity, Access Management and Single Sign-On Web-based Solutions." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-92235.

Full text
Abstract:
The systems' complexity growth over wide networks has increased the need for a centralized access control and strong authentication methods. And because systems have become increasingly distributed, additional need for single sign on solutions have become even more relevant. The aim of this study is to draw the state of the art on strong authentication solutions for protecting resources over networks and establish an evaluation summary of all the solutions presented. The study also presents the single sign on functionality and different architectures to implement it. This study contains a market review of available commercial solutions that implement strong authentication and single sign on. One of the solution is selected for implementing the authentication service for a payroll management system for one of Accenture clients. The technical details regarding this product are presented including architecture, installation and tests. The tested product needed custom developments to successfully implement the certificate authentication combined with an advanced certificate validation service. The single sign on functionality requires custom development to be integrated with all the system components.
APA, Harvard, Vancouver, ISO, and other styles
5

Hummer, Matthias [Verfasser], Günther [Akademischer Betreuer] Pernul, and Dogan [Akademischer Betreuer] Kesdogan. "Sustainable Identity and Access Management / Matthias Hummer ; Günther Pernul, Dogan Kesdogan." Regensburg : Universitätsbibliothek Regensburg, 2019. http://d-nb.info/1189905426/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hummer, Matthias Verfasser], Günther [Akademischer Betreuer] [Pernul, and Dogan [Akademischer Betreuer] Kesdogan. "Sustainable Identity and Access Management / Matthias Hummer ; Günther Pernul, Dogan Kesdogan." Regensburg : Universitätsbibliothek Regensburg, 2019. http://nbn-resolving.de/urn:nbn:de:bvb:355-epub-403116.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Deas, Matthew Burns. "Towards a user centric model for identity and access management within the online environment." Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/775.

Full text
Abstract:
Today, one is expected to remember multiple user names and passwords for different domains when one wants to access on the Internet. Identity management seeks to solve this problem through creating a digital identity that is exchangeable across organisational boundaries. Through the setup of collaboration agreements between multiple domains, users can easily switch across domains without being required to sign in again. However, use of this technology comes with risks of user identity and personal information being compromised. Criminals make use of spoofed websites and social engineering techniques to gain illegal access to user information. Due to this, the need for users to be protected from online threats has increased. Two processes are required to protect the user login information at the time of sign-on. Firstly, user’s information must be protected at the time of sign-on, and secondly, a simple method for the identification of the website is required by the user. This treatise looks at the process for identifying and verifying user information, and how the user can verify the system at sign-in. Three models for identity management are analysed, namely the Microsoft .NET Passport, Liberty Alliance Federated Identity for Single Sign-on and the Mozilla TrustBar for system authentication.
APA, Harvard, Vancouver, ISO, and other styles
8

Filipsson, Emma. "Modelling and simulating Identity and Access Management based lateral movement in a cloud infrastructure." Thesis, KTH, Fysik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-252836.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Engström, Pontus. "Exploring the non-technical challenges : A case study of identity and access management projects." Thesis, KTH, Skolan för industriell teknik och management (ITM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-256228.

Full text
Abstract:
The implementation of an Identity and Access Management (IAM) solution is a complex process to manage, consuming multiple years and involves organizational changes. In its nature, several challenges tend to appear to different stakeholders involved in the process. However, prior research has mainly addressed the technical components of an IAM-solution, hence the technical challenges that emerge during development and implementation. Therefore, the non-technical challenges of the IAM-project work and the challenges that constitute the client implementation are understudied. The purpose of this thesis is to visualize the challenges that emerge when an IAM-solution is implemented. In addition, the challenges when organizational changes occur. The empirical data is conducted through a series of semi-structured interviews with individuals in the IAM line of business. In addition, secondary data is gathered through the review of papers and reports in Information Systems (IS) and Information Technology (IT) projects and outsourcing projects, as well from a non-academical organization with in-depth knowledge of IAM implementations. A qualitative case study of IAM implementations was conducted to investigate the studied complex phenomenon. The findings display the challenges of Insight, Communication, and Endurance (ICE), which tend to be obstacles for all stakeholders involved. Additionally, the organizational changes describe three further challenges of Anchoring, Communication, and Vision (ACV). These challenges mainly appear in client changes, which IAM implementations initiate. The thesis display connections and incoherent with prior research on IS/IT-projects and IAM-projects. In addition, newly uncovered aspects that contribute to research areas are highlighted. The thesis is summarized with some implications and possibilities for future research.
En IAM implementeringen är en komplex och utdragen process som kan ta flera år samt skapar en förändringsresa hos kund. I sin natur skapas flera utmaningar till olika involverade aktörer. Tidigare forskning har främst fokuserat på de tekniska komponenterna som en IAM lösning baseras på, därav de tekniska utmaningarna som tillkommer. Till följd har de icke-tekniska utmaningarna inom IAM projekt och utmaningarna med en implementation hos kund fått bristande uppmärksamhet där få studier har genomförts. Syftet med detta examensarbete är att visualisera de utmaningar som uppstår vid en IAM implementering. Arbetet fokuserar även på utmaningarna med organisatorisk förändring, vilket genomförandet av en IAM lösning skapar. Den primära datainsamlingen genomförs av halvstrukturerade intervjuer med personer inom IAM-branschen. Dessutom samlas sekundär data in från informationssystem (IS) och informationsteknik (IT) projekt samt outsourcingprojekt. Därtill några icke akademiska rapporter med fördjupande information om IAM implementeringar. Examensarbetet är gjort som en kvalitativ fallstudie av IAM implementeringar, detta för att förstå komplexiteten av ämnet. Resultatet visar utmaningar som Insikt, Kommunikation och Uthållighet, vilket tenderar att vara hinder för alla involverade aktörer. Dessutom beskriver de organisatoriska förändringarna tre ytterligare utmaningar för Förankring, Kommunikation och Vision. Dessa utmaningar förekommer hos kund som implementerar en IAM lösning. Uppsatsen visar sammanhängande och osammanhängande aspekter med forskningen inom IS/IT projekt och IAM projekt. Dessutom framhävs nya upptäckta insikter som bidrar till forskningsområdena. Slutligen sammanfattas arbetet med några implikationer samt förslag på vidare forskning.
APA, Harvard, Vancouver, ISO, and other styles
10

Callahan, Michael John. "Exploring Identity Management at Community Colleges in Texas with Open Access to College Computer Networks." ScholarWorks, 2011. https://scholarworks.waldenu.edu/dissertations/1641.

Full text
Abstract:
The study addressed the lack of identity management practices in Texas community colleges to identify guest users who access college computers. Guest user access is required by Texas law and is part of the state's mission to bridge the technology gap; however, improper identification methods leave the college vulnerable to liability issues. The purpose of this study was to eliminate or mitigate liabilities facing colleges by creating and using security policies to identify guest users. This study combined the theoretical concepts of Cameron's internal security management model with the external trust models of the Liberty Alliance and Microsoft's Passport software. The research question revolved around the identity and access management framework used by 13 community colleges in Texas to track guest users and the college's ability to protect the college from illegal acts. Using a grounded theory approach, data were collected by interviewing 13 information technology management professionals at the community colleges regarding their security policies and procedures as well as by campus observations of security practices. The results of constant comparison analysis indicate that no universal theory was being used. Only 3 of the 13 colleges tracked guest user access. Reasons for not tracking guest access included lack of financial and technology resources and process knowledge. Based on these findings, the identity management infrastructure theory was recommended for network access control, self-registration, and identity authentication at these colleges and many other colleges. The implications for social change include raising awareness of the risks most community colleges face from network security breaches, regulatory noncompliance, and lawsuit damages that could result from the lack of an identity management process.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Identity access management"

1

Rawal, Bharat S., Gunasekaran Manogaran, and Alexender Peter. Cybersecurity and Identity Access Management. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-2658-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Premdeep, Banga, and Carroll Brandon, eds. AAA identity management security. Indianapolis, Ind: Cisco Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ramey, Kenneth. Pro Oracle Identity and Access Management Suite. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1521-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pohlman, Marlin B. Oracle Identity Management. London: Taylor and Francis, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Access and identity management for libraries: Controlling access to online information. London: Facet, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Digital identity and access management: Technologies and frameworks. Hershey, PA: Information Science Reference, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

International Business Machines Corporation. International Technical Support Organization, ed. Identity management design guide with IBM Tivoli identity manger. 3rd ed. [Austin, Tex.]: IBM International Technical Support Organization, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

International Business Machines Corporation. International Technical Support Organization, ed. Identity management design guide with IBM Tivoli identity manager. 4th ed. [Poughkeepsie, NY]: IBM International Technical Support Organization, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Access control systems: Security, identity, management, and trust models. New York: Springer, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Understanding SAP NetWeaver Identity management. Boston: SAP and Galileo Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Identity access management"

1

D’Oliveiro, Michael. "Identity access management." In The Streaming Media Guide, 100–118. Abingdon, Oxon ; New York, NY : Routledge, 2019.: Routledge, 2019. http://dx.doi.org/10.4324/9780429429750-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Haber, Morey J., and Darran Rolls. "Privileged Access Management." In Identity Attack Vectors, 137–50. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5165-2_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Haber, Morey J., and Darran Rolls. "Privileged Access Management (PAM)." In Identity Attack Vectors, 65–79. Berkeley, CA: Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0233-1_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sturrus, Edwin, and Olga Kulikova. "Identity and Access Management." In Encyclopedia of Cloud Computing, 396–405. Chichester, UK: John Wiley & Sons, Ltd, 2016. http://dx.doi.org/10.1002/9781118821930.ch33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Png, Adrian, and Luc Demanche. "Identity and Access Management." In Getting Started with Oracle Cloud Free Tier, 17–34. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6011-1_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Danturthi, R. Sarma. "Identity and Access Management." In 70 Tips and Tricks for Mastering the CISSP Exam, 207–23. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6225-2_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Robichau, Bernard Peter. "Identity and Access Management." In Healthcare Information Privacy and Security, 69–80. Berkeley, CA: Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6677-8_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Beach, Brian. "Identity and Access Management." In Pro Powershell for Amazon Web Services, 193–214. Berkeley, CA: Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6452-1_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Beach, Brian, Steven Armentrout, Rodney Bozo, and Emmanuel Tsouris. "Identity and Access Management." In Pro PowerShell for Amazon Web Services, 199–235. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4850-8_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ots, Karl. "Identity and Access Management." In Azure Security Handbook, 11–38. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7292-3_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Identity access management"

1

WeiYi Liu, Yue Tan, and Enwei Zhang. "Service token for identity access management." In 2009 IEEE Asia-Pacific Services Computing Conference (APSCC). IEEE, 2009. http://dx.doi.org/10.1109/apscc.2009.5394143.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kao, Min-Chih, Yi-Shiung Yeh, and Chuan-Chi Wang. "Untraceable Identity Management Framework for Mobile Access." In 2008 Eighth International Conference on Intelligent Systems Design and Applications (ISDA). IEEE, 2008. http://dx.doi.org/10.1109/isda.2008.248.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sharma, Anuja, Sarita Sharma, and Meenu Dave. "Identity and access management- a comprehensive study." In 2015 International Conference on Green Computing and Internet of Things (ICGCIoT). IEEE, 2015. http://dx.doi.org/10.1109/icgciot.2015.7380701.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yang, Yan, Xingyuan Chen, Guangxia Wang, and Lifeng Cao. "An Identity and Access Management Architecture in Cloud." In 2014 7th International Symposium on Computational Intelligence and Design (ISCID). IEEE, 2014. http://dx.doi.org/10.1109/iscid.2014.221.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Faraji, Mohammad, Joon-Myung Kang, Hadi Bannazadeh, and Alberto Leon-Garcia. "Identity access management for Multi-tier cloud infrastructures." In NOMS 2014 - 2014 IEEE/IFIP Network Operations and Management Symposium. IEEE, 2014. http://dx.doi.org/10.1109/noms.2014.6838229.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Katsikogiannis, Georgios, Sarandis Mitropoulos, and Christos Douligeris. "An Identity and Access Management approach for SOA." In 2016 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT). IEEE, 2016. http://dx.doi.org/10.1109/isspit.2016.7886021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Indu, I., and P. M. Rubesh Anand. "Identity and access management for cloud web services." In 2015 IEEE Recent Advances in Intelligent Computational Systems (RAICS). IEEE, 2015. http://dx.doi.org/10.1109/raics.2015.7488450.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Visvanathan, Raja, J. P. Singh Joorel, and Gopinath Ganapathy. "A New Landscape of Identity Access Management Federation." In 2023 International Conference on Computer Science and Emerging Technologies (CSET). IEEE, 2023. http://dx.doi.org/10.1109/cset58993.2023.10346708.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Shehu, Abubakar-Sadiq, António Pinto, and Manuel Correia. "Providing Secured Access Delegation in Identity Management Systems." In 17th International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2020. http://dx.doi.org/10.5220/0009892206380644.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Extros, Savio, and T. N. Nisha. "Conceptual framework for adaptive access and identity management." In INTERNATIONAL CONFERENCE ON INNOVATIONS IN ROBOTICS, INTELLIGENT AUTOMATION AND CONTROL. AIP Publishing, 2023. http://dx.doi.org/10.1063/5.0175831.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Identity access management"

1

McCarthy, Jim, Don Faatz, Harry Perper, Chris Peloquin, John Wiltberger, and Leah Kauffman. Identity and access management for electric utilities. Gaithersburg, MD: National Institute of Standards and Technology, July 2018. http://dx.doi.org/10.6028/nist.sp.1800-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Harbitz, Mia Elisabeth. The Civil Registry: A Neglected Dimension of International Development. Inter-American Development Bank, May 2013. http://dx.doi.org/10.18235/0009117.

Full text
Abstract:
The right to a name and nationality is not only one of the most fundamental human rights but also a requirement to access to basic and essential services such as health and education. This right is exercised through an effective and universal civil registration. It also allows for reliable vital statistics and higher levels of transparency and efficacy that provides the foundation for inclusive public policies, especially social programs. Thus civil registry, legal identity and identity management (Id-M) are central elements for social and economic development. On the international stage, the creation and dissemination of knowledge around the civil registration and legal identity field has evolved from a single paper produced by UNICEF in 2000, to several knowledge sharing initiatives where the IDB has played a pivotal role. The launching of a webpage (http://iadb.libguides.com/registros) in 2011 that provides access to all IDB publications and projects on the topic is just one example of it. Birth under-registration rates has dropped from 18 percent to 9 percent in Latin America and the Caribbean (LAC) since the IDB, through its legal identity and registry team took on the topic in 2002 . Though the Bank cannot claim the exclusive credit for this achievement, the fact that a development bank took on the issue is of major consequence.
APA, Harvard, Vancouver, ISO, and other styles
3

Ketterer, Juan Antonio, and Agustina Calatayud. Integrated Value Chain Risk Management. Inter-American Development Bank, January 2016. http://dx.doi.org/10.18235/0010631.

Full text
Abstract:
A widespread view in the private sector is that the lack of access to finance significantly limits the entry into and the performance of value chains. Access to finance is expensive, scarce, and short term in countries in Latin America and the Caribbean, and it hampers firms' investment and the financial management required to gain entry and remain as participants in a value chain. The lack of access to finance is a consequence of a series of market failures that form the basis for public policy intervention. The region's development banks and specialized agencies have thus designed programs to ease access to value chains and improve their performance. This paper suggests that the public sector could have a more effective role in enhancing value chain access and performance by embracing an integrated risk management approach to value chains. This approach will assist thepublic sector identify the various threats to which value chains are exposed, estimate the probability of occurrence and severity of such risks, and ensure risk prevention and mitigation through the use of a cost-effective combination of financial and nonfinancial instruments.
APA, Harvard, Vancouver, ISO, and other styles
4

Baena Olabe, Paloma, and Juan Cruz Vieyra. Access to Information and Targeted Transparency Policies. Inter-American Development Bank, November 2011. http://dx.doi.org/10.18235/0009022.

Full text
Abstract:
This paper contributes to the debate around why and how access to information can be used to prevent and control corruption. Access to information can not only bring corruption cases to light, it can also be a fundamental tool for its prevention and control, given that it encourages the creation of channels of participation and helps to identify vulnerabilities in both the public and the private sectors that might become windows of opportunity for corrupt practices. The paper`s conceptual framework explains how initiatives aimed at promoting access to information that are based on the concept of targeted transparency enable greater accountability in key areas of public management, by taking into consideration the effectiveness and quality of access to information channels or mechanisms, as well as the capacities and interests of the users to gain access to and use this information.
APA, Harvard, Vancouver, ISO, and other styles
5

Gwin, Catherine, Mayra Ruiz, Saleema Vellani, and Alejandro Guerrero. IDB-9: Access to Information. Inter-American Development Bank, March 2013. http://dx.doi.org/10.18235/0010517.

Full text
Abstract:
Following up on the IDB-9 commitments, the Inter-American Development Bank (IDB, or Bank) established a new Access to Information Policy that took effect on January 1, 2011. The new policy was expected to match international best practices and to increase the overall transparency of the Bank, strengthening its governance and development effectiveness. This review assesses the extent to which the access to information reform has been fully and effectively implemented. The review finds that the new policy largely matches best practices in comparator institutions, with, however, one provision that is unique to the IDB policy and inconsistent with the core principle of transparency: a broadly written exception to disclosure of country-specific information to which a country objects. As evidence of country use of this exception already suggests, this exception could completely undermine the access to information reform endeavor. The policy cannot be implemented effectively unless the country-specific exception is narrowed. Overall, the Bank is in the process of fully implementing the Access to Information Policy. Implementation progress has been substantial in the key areas of designing a regulatory framework, training staff, upgrading the Bank's document management system, and establishing governance structures and processes; and issues are being addressed as they become evident. Still, key steps to full and effective implementation remain under way. As a consequence, the effectiveness of the new policy has been significant in relation to the disclosure of key documents (such as Board-related information) but remains limited overall. Important revisions to the Implementation Guidelines have taken much longer than planned, and remain a work in progress. Timely disclosure and improved online access remain challenges. The share of documents made public under the new policy has decreased marginally, and staff and external stakeholders report limited awareness of the new policy. These findings reflect a need to improve IT monitoring systems to ensure policy compliance, expand staff training, broaden the communications strategy, and improve the online accessibility of information. This review offers six suggestions for further actions to advance effective implementation of the Access to Information Policy: (i) revise the policy to clarify that redaction is the remedy for country objections to disclosure of country-specific information, and make explicit that the final decision on the handling of information lies with the Bank, after consultation in cases of country concern; (ii) to be consistent with IDB-9 commitments to disclose project results, include Expanded Project Supervision Reports (XPSRs) in the list of disclosed information for non-sovereign-guaranteed operations; (iii) to effectively monitor policy compliance, establish a mechanism to spot-check the accuracy of document classification; (iv) enhance and launch the planned tracking system for timely disclosure of public information; (v) improve the IDB's website and better integrate the different repository systems to ensure easy and adequate accessibility to the Bank's information; and (vi) identify and track indicators of transparency.
APA, Harvard, Vancouver, ISO, and other styles
6

Shaheen, Susan, Elliot Shaheen, Adam Cohen, Jacquelyn Broader, and Richard Davis. Managing the Curb: Understanding the Impacts of On-Demand Mobility on Public Transit, Micromobility, and Pedestrians. Mineta Transportation Institute, July 2022. http://dx.doi.org/10.31979/mti.2022.1904.

Full text
Abstract:
In recent years, innovative mobility and shifts in travel and consumption behavior are changing how people access and use the curb. Shared mobility—the shared use of a vehicle, bicycle, scooter, or other mode—coupled with outdoor dining, curbside pick-up, and robotic delivery are creating new needs related to the planning, management, and enforcement of curb access. This study examines curb planning and management from several angles, such as safety, social equity, and multimodal connections. This research employs a multi-method approach to identify the changing needs for curb space management and how to meet these needs through new planning and implementation policies and strategies. As part of this study, the authors conducted 23 interviews. Respondents were chosen to represent public, private, and non-profit sector perspectives. Additionally, the authors employed a survey of 1,033 curb users and 241 taxi, transportation network company (TNC), and public transportation drivers. The study finds that changes in mode choice and curbside use can result in a variety of impacts on access, social equity, congestion, device management, pick-up and drop-off, and goods delivery, to name a few. The curb also has the potential to be disrupted by emerging modes, such as robotic delivery vehicles (also known as personal delivery devices) and automated vehicles. As these emerging developments continue to impact the curb, it is becoming increasingly important for policymakers to have an appropriate framework for planning and managing curb space in urban areas.
APA, Harvard, Vancouver, ISO, and other styles
7

Maletta, Giovanna, and Mike Lewis. Post-shipment On-site Inspections and Stockpile Management Assistance: Bridging Gaps. Stockholm International Peace Research Institute, August 2022. http://dx.doi.org/10.55163/ulfp1679.

Full text
Abstract:
Post-shipment on-site inspections and international assistance in physical security and stockpile management (PSSM) have different scopes and objectives. On-site inspections allow exporting states to check exported military materiel to ensure that the importer is complying with its commitments, while PSSM assistance aims to improve states’ weapons and ammunition management systems. However, both instruments allow foreign specialists to visit a state’s weapons and ammunition storage facilities and enable information gathering to assess their integrity and identify possible diversion risks. This policy brief highlights that building informal linkages between these instruments, especially with regard to states and actors that conduct inspections and are involved in funding or implementing PSSM assistance, could contribute towards establishing more comprehensive forms of post-shipment cooperation. In addition, applying lessons learned from PSSM assistance in terms of gaining access to states’ facilities, cooperating with the beneficiary importing states, and identifying limitations and opportunities associated with the use of tracking technologies could help to address some of the challenges encountered when conducting on-site inspections. PSSM assistance programmes could also include modules to raise awareness about on-site inspections and be a source of expertise that could assist states when implementing these controls.
APA, Harvard, Vancouver, ISO, and other styles
8

Butcher, Neil, and Alison Zimmermann. Opportunities and Challenges for EMIS Implementation in the Caribbean. Inter-American Development Bank, August 2023. http://dx.doi.org/10.18235/0005071.

Full text
Abstract:
This report aims to identify relative strengths and weaknesses in Education Management Information Systems (EMIS) across the Caribbean region, as well as recommendations for improvement, by collating findings from analysis of EMIS implementation in three countries -Barbados (2022), Jamaica (2019), and Suriname (2019-20)- and a description of the Guyana EMIS. The analysis highlights three strengths across the countries analyzed: (i) use of annual school census as a data capturing tool; (ii) use of data and digital content for the management of students, learning, and teaching; and (iii) the availability of technological infrastructure in place to run the EMIS. It identifies challenges in: governance in terms of EMIS policy and design; various aspects of the collection, processing, storage, management, analysis and use of data; and access to the required physical infrastructure, equipment, technology, and internet connectivity. The document points to the need for an EMIS policy linked to ICT and education policies and to national objectives, a change management strategy, ongoing capacity building, and a closer collaboration between countries and with regional bodies, such as the Caribbean Examinations Council (CXC).
APA, Harvard, Vancouver, ISO, and other styles
9

Katz, Aron, Mark Johnson, and Jinelle Sperry. Environmental DNA sampling for at-risk and invasive species management on military ranges : guidelines and protocols for installation biologists and land managers. Engineer Research and Development Center (U.S.), March 2024. http://dx.doi.org/10.21079/11681/48275.

Full text
Abstract:
Environmental DNA (eDNA) analysis, or the detection of trace DNA shed by organisms into their environment, has the potential to transform Army capabilities for threatened and endangered species (TES) and invasive species management by providing a rapid, noninvasive, and cost-effective option for monitoring wildlife. Despite these benefits, eDNA analysis is underutilized on military installations as limited access to guidance materials, protocols, training opportunities, and support from eDNA scientists makes it difficult for installation biologists and military land managers to design and execute eDNA surveys, let alone identify management questions that may benefit from eDNA monitoring. Therefore, the aim of this resource is to increase awareness of the benefits and limitations of eDNA monitoring and provide eDNA study design guidelines and field sampling protocols for nonexperts to make this tool more accessible to installation biologists and land managers and help facilitate the adoption of eDNA-based approaches for wildlife management on military ranges.
APA, Harvard, Vancouver, ISO, and other styles
10

Kennedy, Alan, David Moore, and Taylor Rycroft. Field survey to prioritize needs for modernizing dredged material evaluation guidance. Engineer Research and Development Center (U.S.), May 2021. http://dx.doi.org/10.21079/11681/40701.

Full text
Abstract:
This technical note synthesizes and disseminates results of a 2020 survey of USACE dredging program and project managers to identify and prioritize needs related to the modernization and streamlining of the dredged material assessment decision guidance pursuant to Section 404 of the Clean Water Act (CWA) and Section 103 of the Marine Protection Research and Sanctuaries Act (MPRSA). Priorities identified through the survey and subsequent follow-on interviews—together with advances in science and technology—will facilitate development of an electronic decision guidance tool to enable consistent, timely, and cost-effective dredged material management decisions. This tool will also facilitate a standardized database for ready access to historical data.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography