Academic literature on the topic 'Identity access management'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Identity access management.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Identity access management"
Pol, Mr Vinay Jayprakash. "Identity and Access Management Tools." International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (June 30, 2019): 796–98. http://dx.doi.org/10.31142/ijtsrd23935.
Full textUddin, Mumina, and David Preston. "Systematic Review of Identity Access Management in Information Security." Journal of Advances in Computer Networks 3, no. 2 (2015): 150–56. http://dx.doi.org/10.7763/jacn.2015.v3.158.
Full textCarnley, P. Renee, and Houssain Kettani. "Identity and Access Management for the Internet of Things." International Journal of Future Computer and Communication 8, no. 4 (December 2019): 129–33. http://dx.doi.org/10.18178/ijfcc.2019.8.4.554.
Full textKumar, Vikas, and Aashish Bhardwaj. "Identity Management Systems." International Journal of Strategic Decision Sciences 9, no. 1 (January 2018): 63–78. http://dx.doi.org/10.4018/ijsds.2018010105.
Full textJin, Qiang, and Deren Kudeki. "Identity and Access Management for Libraries." Technical Services Quarterly 36, no. 1 (January 2, 2019): 44–60. http://dx.doi.org/10.1080/07317131.2018.1532056.
Full textFuchs, Ludwig, and Günther Pernul. "Qualitätssicherung im Identity- und Access Management." HMD Praxis der Wirtschaftsinformatik 50, no. 1 (February 2013): 88–97. http://dx.doi.org/10.1007/bf03340780.
Full textPawar, Pratik. "KeyHound - Identity Provider and Access Management." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (April 9, 2024): 1–5. http://dx.doi.org/10.55041/ijsrem30444.
Full textMartin, Luther. "Identity-based Encryption: From Identity and Access Management to Enterprise Privacy Management." Information Systems Security 16, no. 1 (March 28, 2007): 9–14. http://dx.doi.org/10.1080/10658980601051268.
Full textSaloni Kumari. "Identity and access management: "Elevating security and efficiency: Unveiling the crucial aspects of identity and access management”." International Journal of Engineering & Technology 12, no. 1 (September 6, 2023): 11–14. http://dx.doi.org/10.14419/ijet.v12i1.32333.
Full textDhamdhere, Mayuri, Shridevi Karande, and Madhura Phatak. "Peer Group Analysis in Identity and Access Management to Identify Anomalies." International Journal of Engineering and Technology 9, no. 3S (July 17, 2017): 116–21. http://dx.doi.org/10.21817/ijet/2017/v9i3/170903s020.
Full textDissertations / Theses on the topic "Identity access management"
Fryaufová, Lucie. "Řízení identit v organizacích." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-162629.
Full textJaferian, Pooya. "User-centered design of identity and access management systems." Thesis, University of British Columbia, 2014. http://hdl.handle.net/2429/51243.
Full textApplied Science, Faculty of
Electrical and Computer Engineering, Department of
Graduate
Kotora, Ondřej. "Centralizovaná správa rolí." Master's thesis, Vysoká škola ekonomická v Praze, 2008. http://www.nusl.cz/ntk/nusl-3371.
Full textRhermini, Siham. "Identity, Access Management and Single Sign-On Web-based Solutions." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-92235.
Full textHummer, Matthias [Verfasser], Günther [Akademischer Betreuer] Pernul, and Dogan [Akademischer Betreuer] Kesdogan. "Sustainable Identity and Access Management / Matthias Hummer ; Günther Pernul, Dogan Kesdogan." Regensburg : Universitätsbibliothek Regensburg, 2019. http://d-nb.info/1189905426/34.
Full textHummer, Matthias Verfasser], Günther [Akademischer Betreuer] [Pernul, and Dogan [Akademischer Betreuer] Kesdogan. "Sustainable Identity and Access Management / Matthias Hummer ; Günther Pernul, Dogan Kesdogan." Regensburg : Universitätsbibliothek Regensburg, 2019. http://nbn-resolving.de/urn:nbn:de:bvb:355-epub-403116.
Full textDeas, Matthew Burns. "Towards a user centric model for identity and access management within the online environment." Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/775.
Full textFilipsson, Emma. "Modelling and simulating Identity and Access Management based lateral movement in a cloud infrastructure." Thesis, KTH, Fysik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-252836.
Full textEngström, Pontus. "Exploring the non-technical challenges : A case study of identity and access management projects." Thesis, KTH, Skolan för industriell teknik och management (ITM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-256228.
Full textEn IAM implementeringen är en komplex och utdragen process som kan ta flera år samt skapar en förändringsresa hos kund. I sin natur skapas flera utmaningar till olika involverade aktörer. Tidigare forskning har främst fokuserat på de tekniska komponenterna som en IAM lösning baseras på, därav de tekniska utmaningarna som tillkommer. Till följd har de icke-tekniska utmaningarna inom IAM projekt och utmaningarna med en implementation hos kund fått bristande uppmärksamhet där få studier har genomförts. Syftet med detta examensarbete är att visualisera de utmaningar som uppstår vid en IAM implementering. Arbetet fokuserar även på utmaningarna med organisatorisk förändring, vilket genomförandet av en IAM lösning skapar. Den primära datainsamlingen genomförs av halvstrukturerade intervjuer med personer inom IAM-branschen. Dessutom samlas sekundär data in från informationssystem (IS) och informationsteknik (IT) projekt samt outsourcingprojekt. Därtill några icke akademiska rapporter med fördjupande information om IAM implementeringar. Examensarbetet är gjort som en kvalitativ fallstudie av IAM implementeringar, detta för att förstå komplexiteten av ämnet. Resultatet visar utmaningar som Insikt, Kommunikation och Uthållighet, vilket tenderar att vara hinder för alla involverade aktörer. Dessutom beskriver de organisatoriska förändringarna tre ytterligare utmaningar för Förankring, Kommunikation och Vision. Dessa utmaningar förekommer hos kund som implementerar en IAM lösning. Uppsatsen visar sammanhängande och osammanhängande aspekter med forskningen inom IS/IT projekt och IAM projekt. Dessutom framhävs nya upptäckta insikter som bidrar till forskningsområdena. Slutligen sammanfattas arbetet med några implikationer samt förslag på vidare forskning.
Callahan, Michael John. "Exploring Identity Management at Community Colleges in Texas with Open Access to College Computer Networks." ScholarWorks, 2011. https://scholarworks.waldenu.edu/dissertations/1641.
Full textBooks on the topic "Identity access management"
Rawal, Bharat S., Gunasekaran Manogaran, and Alexender Peter. Cybersecurity and Identity Access Management. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-2658-7.
Full textPremdeep, Banga, and Carroll Brandon, eds. AAA identity management security. Indianapolis, Ind: Cisco Press, 2011.
Find full textRamey, Kenneth. Pro Oracle Identity and Access Management Suite. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1521-0.
Full textPohlman, Marlin B. Oracle Identity Management. London: Taylor and Francis, 2008.
Find full textAccess and identity management for libraries: Controlling access to online information. London: Facet, 2006.
Find full textDigital identity and access management: Technologies and frameworks. Hershey, PA: Information Science Reference, 2012.
Find full textInternational Business Machines Corporation. International Technical Support Organization, ed. Identity management design guide with IBM Tivoli identity manger. 3rd ed. [Austin, Tex.]: IBM International Technical Support Organization, 2009.
Find full textInternational Business Machines Corporation. International Technical Support Organization, ed. Identity management design guide with IBM Tivoli identity manager. 4th ed. [Poughkeepsie, NY]: IBM International Technical Support Organization, 2009.
Find full textAccess control systems: Security, identity, management, and trust models. New York: Springer, 2005.
Find full textUnderstanding SAP NetWeaver Identity management. Boston: SAP and Galileo Press, 2010.
Find full textBook chapters on the topic "Identity access management"
D’Oliveiro, Michael. "Identity access management." In The Streaming Media Guide, 100–118. Abingdon, Oxon ; New York, NY : Routledge, 2019.: Routledge, 2019. http://dx.doi.org/10.4324/9780429429750-7.
Full textHaber, Morey J., and Darran Rolls. "Privileged Access Management." In Identity Attack Vectors, 137–50. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5165-2_13.
Full textHaber, Morey J., and Darran Rolls. "Privileged Access Management (PAM)." In Identity Attack Vectors, 65–79. Berkeley, CA: Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0233-1_8.
Full textSturrus, Edwin, and Olga Kulikova. "Identity and Access Management." In Encyclopedia of Cloud Computing, 396–405. Chichester, UK: John Wiley & Sons, Ltd, 2016. http://dx.doi.org/10.1002/9781118821930.ch33.
Full textPng, Adrian, and Luc Demanche. "Identity and Access Management." In Getting Started with Oracle Cloud Free Tier, 17–34. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6011-1_2.
Full textDanturthi, R. Sarma. "Identity and Access Management." In 70 Tips and Tricks for Mastering the CISSP Exam, 207–23. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6225-2_5.
Full textRobichau, Bernard Peter. "Identity and Access Management." In Healthcare Information Privacy and Security, 69–80. Berkeley, CA: Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6677-8_7.
Full textBeach, Brian. "Identity and Access Management." In Pro Powershell for Amazon Web Services, 193–214. Berkeley, CA: Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6452-1_11.
Full textBeach, Brian, Steven Armentrout, Rodney Bozo, and Emmanuel Tsouris. "Identity and Access Management." In Pro PowerShell for Amazon Web Services, 199–235. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4850-8_9.
Full textOts, Karl. "Identity and Access Management." In Azure Security Handbook, 11–38. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7292-3_2.
Full textConference papers on the topic "Identity access management"
WeiYi Liu, Yue Tan, and Enwei Zhang. "Service token for identity access management." In 2009 IEEE Asia-Pacific Services Computing Conference (APSCC). IEEE, 2009. http://dx.doi.org/10.1109/apscc.2009.5394143.
Full textKao, Min-Chih, Yi-Shiung Yeh, and Chuan-Chi Wang. "Untraceable Identity Management Framework for Mobile Access." In 2008 Eighth International Conference on Intelligent Systems Design and Applications (ISDA). IEEE, 2008. http://dx.doi.org/10.1109/isda.2008.248.
Full textSharma, Anuja, Sarita Sharma, and Meenu Dave. "Identity and access management- a comprehensive study." In 2015 International Conference on Green Computing and Internet of Things (ICGCIoT). IEEE, 2015. http://dx.doi.org/10.1109/icgciot.2015.7380701.
Full textYang, Yan, Xingyuan Chen, Guangxia Wang, and Lifeng Cao. "An Identity and Access Management Architecture in Cloud." In 2014 7th International Symposium on Computational Intelligence and Design (ISCID). IEEE, 2014. http://dx.doi.org/10.1109/iscid.2014.221.
Full textFaraji, Mohammad, Joon-Myung Kang, Hadi Bannazadeh, and Alberto Leon-Garcia. "Identity access management for Multi-tier cloud infrastructures." In NOMS 2014 - 2014 IEEE/IFIP Network Operations and Management Symposium. IEEE, 2014. http://dx.doi.org/10.1109/noms.2014.6838229.
Full textKatsikogiannis, Georgios, Sarandis Mitropoulos, and Christos Douligeris. "An Identity and Access Management approach for SOA." In 2016 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT). IEEE, 2016. http://dx.doi.org/10.1109/isspit.2016.7886021.
Full textIndu, I., and P. M. Rubesh Anand. "Identity and access management for cloud web services." In 2015 IEEE Recent Advances in Intelligent Computational Systems (RAICS). IEEE, 2015. http://dx.doi.org/10.1109/raics.2015.7488450.
Full textVisvanathan, Raja, J. P. Singh Joorel, and Gopinath Ganapathy. "A New Landscape of Identity Access Management Federation." In 2023 International Conference on Computer Science and Emerging Technologies (CSET). IEEE, 2023. http://dx.doi.org/10.1109/cset58993.2023.10346708.
Full textShehu, Abubakar-Sadiq, António Pinto, and Manuel Correia. "Providing Secured Access Delegation in Identity Management Systems." In 17th International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2020. http://dx.doi.org/10.5220/0009892206380644.
Full textExtros, Savio, and T. N. Nisha. "Conceptual framework for adaptive access and identity management." In INTERNATIONAL CONFERENCE ON INNOVATIONS IN ROBOTICS, INTELLIGENT AUTOMATION AND CONTROL. AIP Publishing, 2023. http://dx.doi.org/10.1063/5.0175831.
Full textReports on the topic "Identity access management"
McCarthy, Jim, Don Faatz, Harry Perper, Chris Peloquin, John Wiltberger, and Leah Kauffman. Identity and access management for electric utilities. Gaithersburg, MD: National Institute of Standards and Technology, July 2018. http://dx.doi.org/10.6028/nist.sp.1800-2.
Full textHarbitz, Mia Elisabeth. The Civil Registry: A Neglected Dimension of International Development. Inter-American Development Bank, May 2013. http://dx.doi.org/10.18235/0009117.
Full textKetterer, Juan Antonio, and Agustina Calatayud. Integrated Value Chain Risk Management. Inter-American Development Bank, January 2016. http://dx.doi.org/10.18235/0010631.
Full textBaena Olabe, Paloma, and Juan Cruz Vieyra. Access to Information and Targeted Transparency Policies. Inter-American Development Bank, November 2011. http://dx.doi.org/10.18235/0009022.
Full textGwin, Catherine, Mayra Ruiz, Saleema Vellani, and Alejandro Guerrero. IDB-9: Access to Information. Inter-American Development Bank, March 2013. http://dx.doi.org/10.18235/0010517.
Full textShaheen, Susan, Elliot Shaheen, Adam Cohen, Jacquelyn Broader, and Richard Davis. Managing the Curb: Understanding the Impacts of On-Demand Mobility on Public Transit, Micromobility, and Pedestrians. Mineta Transportation Institute, July 2022. http://dx.doi.org/10.31979/mti.2022.1904.
Full textMaletta, Giovanna, and Mike Lewis. Post-shipment On-site Inspections and Stockpile Management Assistance: Bridging Gaps. Stockholm International Peace Research Institute, August 2022. http://dx.doi.org/10.55163/ulfp1679.
Full textButcher, Neil, and Alison Zimmermann. Opportunities and Challenges for EMIS Implementation in the Caribbean. Inter-American Development Bank, August 2023. http://dx.doi.org/10.18235/0005071.
Full textKatz, Aron, Mark Johnson, and Jinelle Sperry. Environmental DNA sampling for at-risk and invasive species management on military ranges : guidelines and protocols for installation biologists and land managers. Engineer Research and Development Center (U.S.), March 2024. http://dx.doi.org/10.21079/11681/48275.
Full textKennedy, Alan, David Moore, and Taylor Rycroft. Field survey to prioritize needs for modernizing dredged material evaluation guidance. Engineer Research and Development Center (U.S.), May 2021. http://dx.doi.org/10.21079/11681/40701.
Full text