Journal articles on the topic 'Identity access management'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Identity access management.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Pol, Mr Vinay Jayprakash. "Identity and Access Management Tools." International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (June 30, 2019): 796–98. http://dx.doi.org/10.31142/ijtsrd23935.
Full textUddin, Mumina, and David Preston. "Systematic Review of Identity Access Management in Information Security." Journal of Advances in Computer Networks 3, no. 2 (2015): 150–56. http://dx.doi.org/10.7763/jacn.2015.v3.158.
Full textCarnley, P. Renee, and Houssain Kettani. "Identity and Access Management for the Internet of Things." International Journal of Future Computer and Communication 8, no. 4 (December 2019): 129–33. http://dx.doi.org/10.18178/ijfcc.2019.8.4.554.
Full textKumar, Vikas, and Aashish Bhardwaj. "Identity Management Systems." International Journal of Strategic Decision Sciences 9, no. 1 (January 2018): 63–78. http://dx.doi.org/10.4018/ijsds.2018010105.
Full textJin, Qiang, and Deren Kudeki. "Identity and Access Management for Libraries." Technical Services Quarterly 36, no. 1 (January 2, 2019): 44–60. http://dx.doi.org/10.1080/07317131.2018.1532056.
Full textFuchs, Ludwig, and Günther Pernul. "Qualitätssicherung im Identity- und Access Management." HMD Praxis der Wirtschaftsinformatik 50, no. 1 (February 2013): 88–97. http://dx.doi.org/10.1007/bf03340780.
Full textPawar, Pratik. "KeyHound - Identity Provider and Access Management." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (April 9, 2024): 1–5. http://dx.doi.org/10.55041/ijsrem30444.
Full textMartin, Luther. "Identity-based Encryption: From Identity and Access Management to Enterprise Privacy Management." Information Systems Security 16, no. 1 (March 28, 2007): 9–14. http://dx.doi.org/10.1080/10658980601051268.
Full textSaloni Kumari. "Identity and access management: "Elevating security and efficiency: Unveiling the crucial aspects of identity and access management”." International Journal of Engineering & Technology 12, no. 1 (September 6, 2023): 11–14. http://dx.doi.org/10.14419/ijet.v12i1.32333.
Full textDhamdhere, Mayuri, Shridevi Karande, and Madhura Phatak. "Peer Group Analysis in Identity and Access Management to Identify Anomalies." International Journal of Engineering and Technology 9, no. 3S (July 17, 2017): 116–21. http://dx.doi.org/10.21817/ijet/2017/v9i3/170903s020.
Full textKunz, Michael, Alexander Puchta, Sebastian Groll, Ludwig Fuchs, and Günther Pernul. "Attribute quality management for dynamic identity and access management." Journal of Information Security and Applications 44 (February 2019): 64–79. http://dx.doi.org/10.1016/j.jisa.2018.11.004.
Full textGoth, G. "Identity management, access specs are rolling along." IEEE Internet Computing 9, no. 1 (January 2005): 9–11. http://dx.doi.org/10.1109/mic.2005.16.
Full textEverett, Cath. "Identity and Access Management: the second wave." Computer Fraud & Security 2011, no. 5 (May 2011): 11–13. http://dx.doi.org/10.1016/s1361-3723(11)70051-3.
Full textVarma, Hardik. "Identity Access Management (IAM), Privilege Access Management (PAM) & Security Operation Center (SOC)." International Journal for Research in Applied Science and Engineering Technology 9, no. 11 (November 30, 2021): 1460–66. http://dx.doi.org/10.22214/ijraset.2021.39029.
Full textCrnic, Josipa. "Access and Identity Management for Libraries: Controlling Access to Online Information." Australian Academic & Research Libraries 46, no. 1 (January 2, 2015): 64–65. http://dx.doi.org/10.1080/00048623.2014.993451.
Full textMaclean, Lesa. "Access and identity management for libraries: Controlling access to online information." Australian Library Journal 64, no. 1 (January 2, 2015): 57. http://dx.doi.org/10.1080/00049670.2014.988841.
Full textLodwick, David. "Access and Identity Management for Libraries: Controlling Access to Online Information." Technical Services Quarterly 32, no. 1 (December 17, 2014): 112–13. http://dx.doi.org/10.1080/07317131.2015.972909.
Full textGunter, Carl, David Liebovitz, and Bradley Malin. "Experience-Based Access Management: A Life-Cycle Framework for Identity and Access Management Systems." IEEE Security & Privacy Magazine 9, no. 5 (September 2011): 48–55. http://dx.doi.org/10.1109/msp.2011.72.
Full textAhmed, Md Rayhan, A. K. M. Muzahidul Islam, Swakkhar Shatabda, and Salekul Islam. "Blockchain-Based Identity Management System and Self-Sovereign Identity Ecosystem: A Comprehensive Survey." IEEE Access 10 (2022): 113436–81. http://dx.doi.org/10.1109/access.2022.3216643.
Full textChunduru, Anilkumar, and Sumathy S. "Security strategies for cloud identity management - a study." International Journal of Engineering & Technology 7, no. 2 (May 12, 2018): 732. http://dx.doi.org/10.14419/ijet.v7i2.10410.
Full textAl zoubi, Qusay M., Yousef K. Sanjalawe, and Mohammed Anbar. "An evaluation of identity and access management systems." International Journal of Internet Technology and Secured Transactions 11, no. 1 (2021): 35. http://dx.doi.org/10.1504/ijitst.2021.10035182.
Full textDuggal, Ashmeet Kaur, and Meenu Dave Dr. "INTELLIGENT IDENTITY AND ACCESS MANAGEMENT USING NEURAL NETWORKS." Indian Journal of Computer Science and Engineering 12, no. 1 (February 20, 2021): 47–56. http://dx.doi.org/10.21817/indjcse/2021/v12i1/211201154.
Full textDevlekar, Sanket, and Vidyavati Ramteke. "Identity and Access Management: High-level Conceptual Framework." Revista Gestão Inovação e Tecnologias 11, no. 4 (August 24, 2021): 4885–97. http://dx.doi.org/10.47059/revistageintec.v11i4.2511.
Full textSanjalawe, Yousef K., Mohammed Anbar, and Qusay M. Al zoubi. "An evaluation of identity and access management systems." International Journal of Internet Technology and Secured Transactions 11, no. 1 (2021): 35. http://dx.doi.org/10.1504/ijitst.2021.112868.
Full textAdhirai, S., Paramjit Singh, and R. P. Mahapatra. "Identity and access management using Boto and JSON." International Journal of Engineering & Technology 7, no. 2.8 (March 19, 2018): 640. http://dx.doi.org/10.14419/ijet.v7i2.8.10550.
Full textJalili, Vahid, Enis Afgan, James Taylor, and Jeremy Goecks. "Cloud bursting galaxy: federated identity and access management." Bioinformatics 36, no. 1 (June 14, 2019): 1–9. http://dx.doi.org/10.1093/bioinformatics/btz472.
Full textS., Devlekar,, and Ramteke, V. "Identity and Access Management: High-level Conceptual Framework." CARDIOMETRY, no. 24 (November 30, 2022): 393–99. http://dx.doi.org/10.18137/cardiometry.2022.24.393399.
Full textKifayat, Kashif, Sameeh Abdulghafour Jassim, and Sufyan T. Faraj. "Management of Identity and Access in the Cloud." Journal of University of Anbar for Pure Science 6, no. 2 (August 1, 2012): 22–33. http://dx.doi.org/10.37652/juaps.2012.63234.
Full textGodfrey, Duncan. "Layering identity and access management to disrupt attacks." Network Security 2021, no. 11 (November 2021): 17–19. http://dx.doi.org/10.1016/s1353-4858(21)00133-1.
Full textWang, Shangping, Ru Pei, and Yaling Zhang. "EIDM: A Ethereum-Based Cloud User Identity Management Protocol." IEEE Access 7 (2019): 115281–91. http://dx.doi.org/10.1109/access.2019.2933989.
Full textKylänpää, Markku, and Jarno Salonen. "Combining System Integrity Verification with Identity and Access Management." European Conference on Cyber Warfare and Security 21, no. 1 (June 8, 2022): 140–49. http://dx.doi.org/10.34190/eccws.21.1.202.
Full textDivyabharathi D. N. and Nagaraj G. Cholli. "A Review on Identity and Access Management Server (KeyCloak)." International Journal of Security and Privacy in Pervasive Computing 12, no. 3 (July 2020): 46–53. http://dx.doi.org/10.4018/ijsppc.2020070104.
Full textFlieder, Karl. "Identity- und Access-Management mit EAI-Konzepten und -Technologien." Datenschutz und Datensicherheit - DuD 32, no. 8 (August 2008): 532–36. http://dx.doi.org/10.1007/s11623-008-0126-4.
Full textGruschka, N., L. Lo Iacono, and H. Rajasekaran. "Identity and access management in multi-institutional medical research." e & i Elektrotechnik und Informationstechnik 127, no. 5 (May 2010): 143–50. http://dx.doi.org/10.1007/s00502-010-0734-1.
Full textPöhn, Daniela, and Wolfgang Hommel. "New Directions and Challenges within Identity and Access Management." IEEE Communications Standards Magazine 7, no. 2 (June 2023): 84–90. http://dx.doi.org/10.1109/mcomstd.0006.2200077.
Full textMoreno, Rafael Torres, Jesus Garcia-Rodriguez, Jorge Bernal Bernabe, and Antonio Skarmeta. "A Trusted Approach for Decentralised and Privacy-Preserving Identity Management." IEEE Access 9 (2021): 105788–804. http://dx.doi.org/10.1109/access.2021.3099837.
Full textAstorga, Jasone, Marc Barcelo, Aitor Urbieta, and Eduardo Jacob. "How to Survive Identity Management in the Industry 4.0 Era." IEEE Access 9 (2021): 93137–51. http://dx.doi.org/10.1109/access.2021.3092203.
Full textFu, Zom Bo, Jian Xin Wang, Lin Yang, Yuan Cao, and Wei Xing Zhu. "Open Problems for Privacy Preservation in Identity Management." Applied Mechanics and Materials 40-41 (November 2010): 652–56. http://dx.doi.org/10.4028/www.scientific.net/amm.40-41.652.
Full textNuruliansyah, Hendra. "Penerapan Privileged Access Management Menggunakan One Identity Pada Sebuah Perusahaan." INOVA-TIF 2, no. 1 (January 2, 2020): 12. http://dx.doi.org/10.32832/inova-tif.v1i2.2750.
Full textMonson, Jane. "A Review of “Access and Identity Management for Libraries: Controlling Access to Online Information”." Journal of Electronic Resources Librarianship 26, no. 3 (July 3, 2014): 228–29. http://dx.doi.org/10.1080/1941126x.2014.939050.
Full textSchorer, Craig. "A Review of “Access and Identity Management for Libraries: Controlling Access to Online Information”." Journal of Access Services 11, no. 4 (October 2, 2014): 327–28. http://dx.doi.org/10.1080/15367967.2014.945294.
Full textDirgantara, Dhimas, and Is Mardianto. "TEKNIK IDENTITY AND ACCESS MANAGEMENT PADA LAYANAN AMAZON WEB SERVICES." Computatio : Journal of Computer Science and Information Systems 3, no. 1 (June 18, 2019): 1. http://dx.doi.org/10.24912/computatio.v3i1.4270.
Full textKarim Abdul-Hassan, Alia, and Iman Hasson Hadi. "INTELLIGENT AUTHENTICATION FOR IDENTITY AND ACCESS MANAGEMENT: A REVIEW PAPER." Iraqi Journal for Computers and informatics 45, no. 1 (December 8, 2019): 6–10. http://dx.doi.org/10.25195/2017/4512.
Full textHadi, Iman. "INTELLIGENT AUTHENTICATION FOR IDENTITY AND ACCESS MANAGEMENT: A REVIEW PAPER." Iraqi Journal for Computers and Informatics 45, no. 1 (May 1, 2019): 6–10. http://dx.doi.org/10.25195/ijci.v45i1.39.
Full textAguado Corman, Asier, Daniel Fernández Rodríguez, Maria V. Georgiou, Julien Rische, Ioan Cristian Schuszter, Hannah Short, and Paolo Tedesco. "CERN’s Identity and Access Management: A journey to Open Source." EPJ Web of Conferences 245 (2020): 03012. http://dx.doi.org/10.1051/epjconf/202024503012.
Full textSchanzenbach, Martin, and Sebastian Zickau. "Identity and access management in a doping control use case." Datenschutz und Datensicherheit - DuD 41, no. 12 (December 2017): 724–28. http://dx.doi.org/10.1007/s11623-017-0867-z.
Full textRasouli, Hatef, and Changiz Valmohammadi. "Proposing a conceptual framework for customer identity and access management." Global Knowledge, Memory and Communication 69, no. 1/2 (July 29, 2019): 94–116. http://dx.doi.org/10.1108/gkmc-02-2019-0014.
Full textIndu, I., P. M. Rubesh Anand, and Vidhyacharan Bhaskar. "Identity and access management in cloud environment: Mechanisms and challenges." Engineering Science and Technology, an International Journal 21, no. 4 (August 2018): 574–88. http://dx.doi.org/10.1016/j.jestch.2018.05.010.
Full textNikhil Ghadge. "Enhancing threat detection in Identity and Access Management (IAM) systems." International Journal of Science and Research Archive 11, no. 2 (April 30, 2024): 2050–57. http://dx.doi.org/10.30574/ijsra.2024.11.2.0761.
Full textSingla, Ashish, Nakul Gupta, Prageet Aeron, Anshul Jain, Divya Sharma, and Sangeeta Shah Bharadwaj. "Decentralized Identity Management Using Blockchain." Journal of Global Information Management 31, no. 2 (December 29, 2022): 1–24. http://dx.doi.org/10.4018/jgim.315283.
Full text