Literatura académica sobre el tema "Identity access management"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Identity access management".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Identity access management"
Pol, Mr Vinay Jayprakash. "Identity and Access Management Tools". International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (30 de junio de 2019): 796–98. http://dx.doi.org/10.31142/ijtsrd23935.
Texto completoUddin, Mumina y David Preston. "Systematic Review of Identity Access Management in Information Security". Journal of Advances in Computer Networks 3, n.º 2 (2015): 150–56. http://dx.doi.org/10.7763/jacn.2015.v3.158.
Texto completoCarnley, P. Renee y Houssain Kettani. "Identity and Access Management for the Internet of Things". International Journal of Future Computer and Communication 8, n.º 4 (diciembre de 2019): 129–33. http://dx.doi.org/10.18178/ijfcc.2019.8.4.554.
Texto completoKumar, Vikas y Aashish Bhardwaj. "Identity Management Systems". International Journal of Strategic Decision Sciences 9, n.º 1 (enero de 2018): 63–78. http://dx.doi.org/10.4018/ijsds.2018010105.
Texto completoJin, Qiang y Deren Kudeki. "Identity and Access Management for Libraries". Technical Services Quarterly 36, n.º 1 (2 de enero de 2019): 44–60. http://dx.doi.org/10.1080/07317131.2018.1532056.
Texto completoFuchs, Ludwig y Günther Pernul. "Qualitätssicherung im Identity- und Access Management". HMD Praxis der Wirtschaftsinformatik 50, n.º 1 (febrero de 2013): 88–97. http://dx.doi.org/10.1007/bf03340780.
Texto completoPawar, Pratik. "KeyHound - Identity Provider and Access Management". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n.º 04 (9 de abril de 2024): 1–5. http://dx.doi.org/10.55041/ijsrem30444.
Texto completoMartin, Luther. "Identity-based Encryption: From Identity and Access Management to Enterprise Privacy Management". Information Systems Security 16, n.º 1 (28 de marzo de 2007): 9–14. http://dx.doi.org/10.1080/10658980601051268.
Texto completoSaloni Kumari. "Identity and access management: "Elevating security and efficiency: Unveiling the crucial aspects of identity and access management”". International Journal of Engineering & Technology 12, n.º 1 (6 de septiembre de 2023): 11–14. http://dx.doi.org/10.14419/ijet.v12i1.32333.
Texto completoDhamdhere, Mayuri, Shridevi Karande y Madhura Phatak. "Peer Group Analysis in Identity and Access Management to Identify Anomalies". International Journal of Engineering and Technology 9, n.º 3S (17 de julio de 2017): 116–21. http://dx.doi.org/10.21817/ijet/2017/v9i3/170903s020.
Texto completoTesis sobre el tema "Identity access management"
Fryaufová, Lucie. "Řízení identit v organizacích". Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-162629.
Texto completoJaferian, Pooya. "User-centered design of identity and access management systems". Thesis, University of British Columbia, 2014. http://hdl.handle.net/2429/51243.
Texto completoApplied Science, Faculty of
Electrical and Computer Engineering, Department of
Graduate
Kotora, Ondřej. "Centralizovaná správa rolí". Master's thesis, Vysoká škola ekonomická v Praze, 2008. http://www.nusl.cz/ntk/nusl-3371.
Texto completoRhermini, Siham. "Identity, Access Management and Single Sign-On Web-based Solutions". Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-92235.
Texto completoHummer, Matthias [Verfasser], Günther [Akademischer Betreuer] Pernul y Dogan [Akademischer Betreuer] Kesdogan. "Sustainable Identity and Access Management / Matthias Hummer ; Günther Pernul, Dogan Kesdogan". Regensburg : Universitätsbibliothek Regensburg, 2019. http://d-nb.info/1189905426/34.
Texto completoHummer, Matthias Verfasser], Günther [Akademischer Betreuer] [Pernul y Dogan [Akademischer Betreuer] Kesdogan. "Sustainable Identity and Access Management / Matthias Hummer ; Günther Pernul, Dogan Kesdogan". Regensburg : Universitätsbibliothek Regensburg, 2019. http://nbn-resolving.de/urn:nbn:de:bvb:355-epub-403116.
Texto completoDeas, Matthew Burns. "Towards a user centric model for identity and access management within the online environment". Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/775.
Texto completoFilipsson, Emma. "Modelling and simulating Identity and Access Management based lateral movement in a cloud infrastructure". Thesis, KTH, Fysik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-252836.
Texto completoEngström, Pontus. "Exploring the non-technical challenges : A case study of identity and access management projects". Thesis, KTH, Skolan för industriell teknik och management (ITM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-256228.
Texto completoEn IAM implementeringen är en komplex och utdragen process som kan ta flera år samt skapar en förändringsresa hos kund. I sin natur skapas flera utmaningar till olika involverade aktörer. Tidigare forskning har främst fokuserat på de tekniska komponenterna som en IAM lösning baseras på, därav de tekniska utmaningarna som tillkommer. Till följd har de icke-tekniska utmaningarna inom IAM projekt och utmaningarna med en implementation hos kund fått bristande uppmärksamhet där få studier har genomförts. Syftet med detta examensarbete är att visualisera de utmaningar som uppstår vid en IAM implementering. Arbetet fokuserar även på utmaningarna med organisatorisk förändring, vilket genomförandet av en IAM lösning skapar. Den primära datainsamlingen genomförs av halvstrukturerade intervjuer med personer inom IAM-branschen. Dessutom samlas sekundär data in från informationssystem (IS) och informationsteknik (IT) projekt samt outsourcingprojekt. Därtill några icke akademiska rapporter med fördjupande information om IAM implementeringar. Examensarbetet är gjort som en kvalitativ fallstudie av IAM implementeringar, detta för att förstå komplexiteten av ämnet. Resultatet visar utmaningar som Insikt, Kommunikation och Uthållighet, vilket tenderar att vara hinder för alla involverade aktörer. Dessutom beskriver de organisatoriska förändringarna tre ytterligare utmaningar för Förankring, Kommunikation och Vision. Dessa utmaningar förekommer hos kund som implementerar en IAM lösning. Uppsatsen visar sammanhängande och osammanhängande aspekter med forskningen inom IS/IT projekt och IAM projekt. Dessutom framhävs nya upptäckta insikter som bidrar till forskningsområdena. Slutligen sammanfattas arbetet med några implikationer samt förslag på vidare forskning.
Callahan, Michael John. "Exploring Identity Management at Community Colleges in Texas with Open Access to College Computer Networks". ScholarWorks, 2011. https://scholarworks.waldenu.edu/dissertations/1641.
Texto completoLibros sobre el tema "Identity access management"
Rawal, Bharat S., Gunasekaran Manogaran y Alexender Peter. Cybersecurity and Identity Access Management. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-2658-7.
Texto completoPremdeep, Banga y Carroll Brandon, eds. AAA identity management security. Indianapolis, Ind: Cisco Press, 2011.
Buscar texto completoRamey, Kenneth. Pro Oracle Identity and Access Management Suite. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1521-0.
Texto completoPohlman, Marlin B. Oracle Identity Management. London: Taylor and Francis, 2008.
Buscar texto completoAccess and identity management for libraries: Controlling access to online information. London: Facet, 2006.
Buscar texto completoDigital identity and access management: Technologies and frameworks. Hershey, PA: Information Science Reference, 2012.
Buscar texto completoInternational Business Machines Corporation. International Technical Support Organization, ed. Identity management design guide with IBM Tivoli identity manger. 3a ed. [Austin, Tex.]: IBM International Technical Support Organization, 2009.
Buscar texto completoInternational Business Machines Corporation. International Technical Support Organization, ed. Identity management design guide with IBM Tivoli identity manager. 4a ed. [Poughkeepsie, NY]: IBM International Technical Support Organization, 2009.
Buscar texto completoAccess control systems: Security, identity, management, and trust models. New York: Springer, 2005.
Buscar texto completoUnderstanding SAP NetWeaver Identity management. Boston: SAP and Galileo Press, 2010.
Buscar texto completoCapítulos de libros sobre el tema "Identity access management"
D’Oliveiro, Michael. "Identity access management". En The Streaming Media Guide, 100–118. Abingdon, Oxon ; New York, NY : Routledge, 2019.: Routledge, 2019. http://dx.doi.org/10.4324/9780429429750-7.
Texto completoHaber, Morey J. y Darran Rolls. "Privileged Access Management". En Identity Attack Vectors, 137–50. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5165-2_13.
Texto completoHaber, Morey J. y Darran Rolls. "Privileged Access Management (PAM)". En Identity Attack Vectors, 65–79. Berkeley, CA: Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0233-1_8.
Texto completoSturrus, Edwin y Olga Kulikova. "Identity and Access Management". En Encyclopedia of Cloud Computing, 396–405. Chichester, UK: John Wiley & Sons, Ltd, 2016. http://dx.doi.org/10.1002/9781118821930.ch33.
Texto completoPng, Adrian y Luc Demanche. "Identity and Access Management". En Getting Started with Oracle Cloud Free Tier, 17–34. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6011-1_2.
Texto completoDanturthi, R. Sarma. "Identity and Access Management". En 70 Tips and Tricks for Mastering the CISSP Exam, 207–23. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6225-2_5.
Texto completoRobichau, Bernard Peter. "Identity and Access Management". En Healthcare Information Privacy and Security, 69–80. Berkeley, CA: Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6677-8_7.
Texto completoBeach, Brian. "Identity and Access Management". En Pro Powershell for Amazon Web Services, 193–214. Berkeley, CA: Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6452-1_11.
Texto completoBeach, Brian, Steven Armentrout, Rodney Bozo y Emmanuel Tsouris. "Identity and Access Management". En Pro PowerShell for Amazon Web Services, 199–235. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4850-8_9.
Texto completoOts, Karl. "Identity and Access Management". En Azure Security Handbook, 11–38. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7292-3_2.
Texto completoActas de conferencias sobre el tema "Identity access management"
WeiYi Liu, Yue Tan y Enwei Zhang. "Service token for identity access management". En 2009 IEEE Asia-Pacific Services Computing Conference (APSCC). IEEE, 2009. http://dx.doi.org/10.1109/apscc.2009.5394143.
Texto completoKao, Min-Chih, Yi-Shiung Yeh y Chuan-Chi Wang. "Untraceable Identity Management Framework for Mobile Access". En 2008 Eighth International Conference on Intelligent Systems Design and Applications (ISDA). IEEE, 2008. http://dx.doi.org/10.1109/isda.2008.248.
Texto completoSharma, Anuja, Sarita Sharma y Meenu Dave. "Identity and access management- a comprehensive study". En 2015 International Conference on Green Computing and Internet of Things (ICGCIoT). IEEE, 2015. http://dx.doi.org/10.1109/icgciot.2015.7380701.
Texto completoYang, Yan, Xingyuan Chen, Guangxia Wang y Lifeng Cao. "An Identity and Access Management Architecture in Cloud". En 2014 7th International Symposium on Computational Intelligence and Design (ISCID). IEEE, 2014. http://dx.doi.org/10.1109/iscid.2014.221.
Texto completoFaraji, Mohammad, Joon-Myung Kang, Hadi Bannazadeh y Alberto Leon-Garcia. "Identity access management for Multi-tier cloud infrastructures". En NOMS 2014 - 2014 IEEE/IFIP Network Operations and Management Symposium. IEEE, 2014. http://dx.doi.org/10.1109/noms.2014.6838229.
Texto completoKatsikogiannis, Georgios, Sarandis Mitropoulos y Christos Douligeris. "An Identity and Access Management approach for SOA". En 2016 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT). IEEE, 2016. http://dx.doi.org/10.1109/isspit.2016.7886021.
Texto completoIndu, I. y P. M. Rubesh Anand. "Identity and access management for cloud web services". En 2015 IEEE Recent Advances in Intelligent Computational Systems (RAICS). IEEE, 2015. http://dx.doi.org/10.1109/raics.2015.7488450.
Texto completoVisvanathan, Raja, J. P. Singh Joorel y Gopinath Ganapathy. "A New Landscape of Identity Access Management Federation". En 2023 International Conference on Computer Science and Emerging Technologies (CSET). IEEE, 2023. http://dx.doi.org/10.1109/cset58993.2023.10346708.
Texto completoShehu, Abubakar-Sadiq, António Pinto y Manuel Correia. "Providing Secured Access Delegation in Identity Management Systems". En 17th International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2020. http://dx.doi.org/10.5220/0009892206380644.
Texto completoExtros, Savio y T. N. Nisha. "Conceptual framework for adaptive access and identity management". En INTERNATIONAL CONFERENCE ON INNOVATIONS IN ROBOTICS, INTELLIGENT AUTOMATION AND CONTROL. AIP Publishing, 2023. http://dx.doi.org/10.1063/5.0175831.
Texto completoInformes sobre el tema "Identity access management"
McCarthy, Jim, Don Faatz, Harry Perper, Chris Peloquin, John Wiltberger y Leah Kauffman. Identity and access management for electric utilities. Gaithersburg, MD: National Institute of Standards and Technology, julio de 2018. http://dx.doi.org/10.6028/nist.sp.1800-2.
Texto completoHarbitz, Mia Elisabeth. The Civil Registry: A Neglected Dimension of International Development. Inter-American Development Bank, mayo de 2013. http://dx.doi.org/10.18235/0009117.
Texto completoKetterer, Juan Antonio y Agustina Calatayud. Integrated Value Chain Risk Management. Inter-American Development Bank, enero de 2016. http://dx.doi.org/10.18235/0010631.
Texto completoBaena Olabe, Paloma y Juan Cruz Vieyra. Access to Information and Targeted Transparency Policies. Inter-American Development Bank, noviembre de 2011. http://dx.doi.org/10.18235/0009022.
Texto completoGwin, Catherine, Mayra Ruiz, Saleema Vellani y Alejandro Guerrero. IDB-9: Access to Information. Inter-American Development Bank, marzo de 2013. http://dx.doi.org/10.18235/0010517.
Texto completoShaheen, Susan, Elliot Shaheen, Adam Cohen, Jacquelyn Broader y Richard Davis. Managing the Curb: Understanding the Impacts of On-Demand Mobility on Public Transit, Micromobility, and Pedestrians. Mineta Transportation Institute, julio de 2022. http://dx.doi.org/10.31979/mti.2022.1904.
Texto completoMaletta, Giovanna y Mike Lewis. Post-shipment On-site Inspections and Stockpile Management Assistance: Bridging Gaps. Stockholm International Peace Research Institute, agosto de 2022. http://dx.doi.org/10.55163/ulfp1679.
Texto completoButcher, Neil y Alison Zimmermann. Opportunities and Challenges for EMIS Implementation in the Caribbean. Inter-American Development Bank, agosto de 2023. http://dx.doi.org/10.18235/0005071.
Texto completoKatz, Aron, Mark Johnson y Jinelle Sperry. Environmental DNA sampling for at-risk and invasive species management on military ranges : guidelines and protocols for installation biologists and land managers. Engineer Research and Development Center (U.S.), marzo de 2024. http://dx.doi.org/10.21079/11681/48275.
Texto completoKennedy, Alan, David Moore y Taylor Rycroft. Field survey to prioritize needs for modernizing dredged material evaluation guidance. Engineer Research and Development Center (U.S.), mayo de 2021. http://dx.doi.org/10.21079/11681/40701.
Texto completo