Artículos de revistas sobre el tema "Identity access management"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Identity access management".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Pol, Mr Vinay Jayprakash. "Identity and Access Management Tools". International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (30 de junio de 2019): 796–98. http://dx.doi.org/10.31142/ijtsrd23935.
Texto completoUddin, Mumina y David Preston. "Systematic Review of Identity Access Management in Information Security". Journal of Advances in Computer Networks 3, n.º 2 (2015): 150–56. http://dx.doi.org/10.7763/jacn.2015.v3.158.
Texto completoCarnley, P. Renee y Houssain Kettani. "Identity and Access Management for the Internet of Things". International Journal of Future Computer and Communication 8, n.º 4 (diciembre de 2019): 129–33. http://dx.doi.org/10.18178/ijfcc.2019.8.4.554.
Texto completoKumar, Vikas y Aashish Bhardwaj. "Identity Management Systems". International Journal of Strategic Decision Sciences 9, n.º 1 (enero de 2018): 63–78. http://dx.doi.org/10.4018/ijsds.2018010105.
Texto completoJin, Qiang y Deren Kudeki. "Identity and Access Management for Libraries". Technical Services Quarterly 36, n.º 1 (2 de enero de 2019): 44–60. http://dx.doi.org/10.1080/07317131.2018.1532056.
Texto completoFuchs, Ludwig y Günther Pernul. "Qualitätssicherung im Identity- und Access Management". HMD Praxis der Wirtschaftsinformatik 50, n.º 1 (febrero de 2013): 88–97. http://dx.doi.org/10.1007/bf03340780.
Texto completoPawar, Pratik. "KeyHound - Identity Provider and Access Management". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n.º 04 (9 de abril de 2024): 1–5. http://dx.doi.org/10.55041/ijsrem30444.
Texto completoMartin, Luther. "Identity-based Encryption: From Identity and Access Management to Enterprise Privacy Management". Information Systems Security 16, n.º 1 (28 de marzo de 2007): 9–14. http://dx.doi.org/10.1080/10658980601051268.
Texto completoSaloni Kumari. "Identity and access management: "Elevating security and efficiency: Unveiling the crucial aspects of identity and access management”". International Journal of Engineering & Technology 12, n.º 1 (6 de septiembre de 2023): 11–14. http://dx.doi.org/10.14419/ijet.v12i1.32333.
Texto completoDhamdhere, Mayuri, Shridevi Karande y Madhura Phatak. "Peer Group Analysis in Identity and Access Management to Identify Anomalies". International Journal of Engineering and Technology 9, n.º 3S (17 de julio de 2017): 116–21. http://dx.doi.org/10.21817/ijet/2017/v9i3/170903s020.
Texto completoKunz, Michael, Alexander Puchta, Sebastian Groll, Ludwig Fuchs y Günther Pernul. "Attribute quality management for dynamic identity and access management". Journal of Information Security and Applications 44 (febrero de 2019): 64–79. http://dx.doi.org/10.1016/j.jisa.2018.11.004.
Texto completoGoth, G. "Identity management, access specs are rolling along". IEEE Internet Computing 9, n.º 1 (enero de 2005): 9–11. http://dx.doi.org/10.1109/mic.2005.16.
Texto completoEverett, Cath. "Identity and Access Management: the second wave". Computer Fraud & Security 2011, n.º 5 (mayo de 2011): 11–13. http://dx.doi.org/10.1016/s1361-3723(11)70051-3.
Texto completoVarma, Hardik. "Identity Access Management (IAM), Privilege Access Management (PAM) & Security Operation Center (SOC)". International Journal for Research in Applied Science and Engineering Technology 9, n.º 11 (30 de noviembre de 2021): 1460–66. http://dx.doi.org/10.22214/ijraset.2021.39029.
Texto completoCrnic, Josipa. "Access and Identity Management for Libraries: Controlling Access to Online Information". Australian Academic & Research Libraries 46, n.º 1 (2 de enero de 2015): 64–65. http://dx.doi.org/10.1080/00048623.2014.993451.
Texto completoMaclean, Lesa. "Access and identity management for libraries: Controlling access to online information". Australian Library Journal 64, n.º 1 (2 de enero de 2015): 57. http://dx.doi.org/10.1080/00049670.2014.988841.
Texto completoLodwick, David. "Access and Identity Management for Libraries: Controlling Access to Online Information". Technical Services Quarterly 32, n.º 1 (17 de diciembre de 2014): 112–13. http://dx.doi.org/10.1080/07317131.2015.972909.
Texto completoGunter, Carl, David Liebovitz y Bradley Malin. "Experience-Based Access Management: A Life-Cycle Framework for Identity and Access Management Systems". IEEE Security & Privacy Magazine 9, n.º 5 (septiembre de 2011): 48–55. http://dx.doi.org/10.1109/msp.2011.72.
Texto completoAhmed, Md Rayhan, A. K. M. Muzahidul Islam, Swakkhar Shatabda y Salekul Islam. "Blockchain-Based Identity Management System and Self-Sovereign Identity Ecosystem: A Comprehensive Survey". IEEE Access 10 (2022): 113436–81. http://dx.doi.org/10.1109/access.2022.3216643.
Texto completoChunduru, Anilkumar y Sumathy S. "Security strategies for cloud identity management - a study". International Journal of Engineering & Technology 7, n.º 2 (12 de mayo de 2018): 732. http://dx.doi.org/10.14419/ijet.v7i2.10410.
Texto completoAl zoubi, Qusay M., Yousef K. Sanjalawe y Mohammed Anbar. "An evaluation of identity and access management systems". International Journal of Internet Technology and Secured Transactions 11, n.º 1 (2021): 35. http://dx.doi.org/10.1504/ijitst.2021.10035182.
Texto completoDuggal, Ashmeet Kaur y Meenu Dave Dr. "INTELLIGENT IDENTITY AND ACCESS MANAGEMENT USING NEURAL NETWORKS". Indian Journal of Computer Science and Engineering 12, n.º 1 (20 de febrero de 2021): 47–56. http://dx.doi.org/10.21817/indjcse/2021/v12i1/211201154.
Texto completoDevlekar, Sanket y Vidyavati Ramteke. "Identity and Access Management: High-level Conceptual Framework". Revista Gestão Inovação e Tecnologias 11, n.º 4 (24 de agosto de 2021): 4885–97. http://dx.doi.org/10.47059/revistageintec.v11i4.2511.
Texto completoSanjalawe, Yousef K., Mohammed Anbar y Qusay M. Al zoubi. "An evaluation of identity and access management systems". International Journal of Internet Technology and Secured Transactions 11, n.º 1 (2021): 35. http://dx.doi.org/10.1504/ijitst.2021.112868.
Texto completoAdhirai, S., Paramjit Singh y R. P. Mahapatra. "Identity and access management using Boto and JSON". International Journal of Engineering & Technology 7, n.º 2.8 (19 de marzo de 2018): 640. http://dx.doi.org/10.14419/ijet.v7i2.8.10550.
Texto completoJalili, Vahid, Enis Afgan, James Taylor y Jeremy Goecks. "Cloud bursting galaxy: federated identity and access management". Bioinformatics 36, n.º 1 (14 de junio de 2019): 1–9. http://dx.doi.org/10.1093/bioinformatics/btz472.
Texto completoS., Devlekar, y Ramteke, V. "Identity and Access Management: High-level Conceptual Framework". CARDIOMETRY, n.º 24 (30 de noviembre de 2022): 393–99. http://dx.doi.org/10.18137/cardiometry.2022.24.393399.
Texto completoKifayat, Kashif, Sameeh Abdulghafour Jassim y Sufyan T. Faraj. "Management of Identity and Access in the Cloud". Journal of University of Anbar for Pure Science 6, n.º 2 (1 de agosto de 2012): 22–33. http://dx.doi.org/10.37652/juaps.2012.63234.
Texto completoGodfrey, Duncan. "Layering identity and access management to disrupt attacks". Network Security 2021, n.º 11 (noviembre de 2021): 17–19. http://dx.doi.org/10.1016/s1353-4858(21)00133-1.
Texto completoWang, Shangping, Ru Pei y Yaling Zhang. "EIDM: A Ethereum-Based Cloud User Identity Management Protocol". IEEE Access 7 (2019): 115281–91. http://dx.doi.org/10.1109/access.2019.2933989.
Texto completoKylänpää, Markku y Jarno Salonen. "Combining System Integrity Verification with Identity and Access Management". European Conference on Cyber Warfare and Security 21, n.º 1 (8 de junio de 2022): 140–49. http://dx.doi.org/10.34190/eccws.21.1.202.
Texto completoDivyabharathi D. N. y Nagaraj G. Cholli. "A Review on Identity and Access Management Server (KeyCloak)". International Journal of Security and Privacy in Pervasive Computing 12, n.º 3 (julio de 2020): 46–53. http://dx.doi.org/10.4018/ijsppc.2020070104.
Texto completoFlieder, Karl. "Identity- und Access-Management mit EAI-Konzepten und -Technologien". Datenschutz und Datensicherheit - DuD 32, n.º 8 (agosto de 2008): 532–36. http://dx.doi.org/10.1007/s11623-008-0126-4.
Texto completoGruschka, N., L. Lo Iacono y H. Rajasekaran. "Identity and access management in multi-institutional medical research". e & i Elektrotechnik und Informationstechnik 127, n.º 5 (mayo de 2010): 143–50. http://dx.doi.org/10.1007/s00502-010-0734-1.
Texto completoPöhn, Daniela y Wolfgang Hommel. "New Directions and Challenges within Identity and Access Management". IEEE Communications Standards Magazine 7, n.º 2 (junio de 2023): 84–90. http://dx.doi.org/10.1109/mcomstd.0006.2200077.
Texto completoMoreno, Rafael Torres, Jesus Garcia-Rodriguez, Jorge Bernal Bernabe y Antonio Skarmeta. "A Trusted Approach for Decentralised and Privacy-Preserving Identity Management". IEEE Access 9 (2021): 105788–804. http://dx.doi.org/10.1109/access.2021.3099837.
Texto completoAstorga, Jasone, Marc Barcelo, Aitor Urbieta y Eduardo Jacob. "How to Survive Identity Management in the Industry 4.0 Era". IEEE Access 9 (2021): 93137–51. http://dx.doi.org/10.1109/access.2021.3092203.
Texto completoFu, Zom Bo, Jian Xin Wang, Lin Yang, Yuan Cao y Wei Xing Zhu. "Open Problems for Privacy Preservation in Identity Management". Applied Mechanics and Materials 40-41 (noviembre de 2010): 652–56. http://dx.doi.org/10.4028/www.scientific.net/amm.40-41.652.
Texto completoNuruliansyah, Hendra. "Penerapan Privileged Access Management Menggunakan One Identity Pada Sebuah Perusahaan". INOVA-TIF 2, n.º 1 (2 de enero de 2020): 12. http://dx.doi.org/10.32832/inova-tif.v1i2.2750.
Texto completoMonson, Jane. "A Review of “Access and Identity Management for Libraries: Controlling Access to Online Information”". Journal of Electronic Resources Librarianship 26, n.º 3 (3 de julio de 2014): 228–29. http://dx.doi.org/10.1080/1941126x.2014.939050.
Texto completoSchorer, Craig. "A Review of “Access and Identity Management for Libraries: Controlling Access to Online Information”". Journal of Access Services 11, n.º 4 (2 de octubre de 2014): 327–28. http://dx.doi.org/10.1080/15367967.2014.945294.
Texto completoDirgantara, Dhimas y Is Mardianto. "TEKNIK IDENTITY AND ACCESS MANAGEMENT PADA LAYANAN AMAZON WEB SERVICES". Computatio : Journal of Computer Science and Information Systems 3, n.º 1 (18 de junio de 2019): 1. http://dx.doi.org/10.24912/computatio.v3i1.4270.
Texto completoKarim Abdul-Hassan, Alia y Iman Hasson Hadi. "INTELLIGENT AUTHENTICATION FOR IDENTITY AND ACCESS MANAGEMENT: A REVIEW PAPER". Iraqi Journal for Computers and informatics 45, n.º 1 (8 de diciembre de 2019): 6–10. http://dx.doi.org/10.25195/2017/4512.
Texto completoHadi, Iman. "INTELLIGENT AUTHENTICATION FOR IDENTITY AND ACCESS MANAGEMENT: A REVIEW PAPER". Iraqi Journal for Computers and Informatics 45, n.º 1 (1 de mayo de 2019): 6–10. http://dx.doi.org/10.25195/ijci.v45i1.39.
Texto completoAguado Corman, Asier, Daniel Fernández Rodríguez, Maria V. Georgiou, Julien Rische, Ioan Cristian Schuszter, Hannah Short y Paolo Tedesco. "CERN’s Identity and Access Management: A journey to Open Source". EPJ Web of Conferences 245 (2020): 03012. http://dx.doi.org/10.1051/epjconf/202024503012.
Texto completoSchanzenbach, Martin y Sebastian Zickau. "Identity and access management in a doping control use case". Datenschutz und Datensicherheit - DuD 41, n.º 12 (diciembre de 2017): 724–28. http://dx.doi.org/10.1007/s11623-017-0867-z.
Texto completoRasouli, Hatef y Changiz Valmohammadi. "Proposing a conceptual framework for customer identity and access management". Global Knowledge, Memory and Communication 69, n.º 1/2 (29 de julio de 2019): 94–116. http://dx.doi.org/10.1108/gkmc-02-2019-0014.
Texto completoIndu, I., P. M. Rubesh Anand y Vidhyacharan Bhaskar. "Identity and access management in cloud environment: Mechanisms and challenges". Engineering Science and Technology, an International Journal 21, n.º 4 (agosto de 2018): 574–88. http://dx.doi.org/10.1016/j.jestch.2018.05.010.
Texto completoNikhil Ghadge. "Enhancing threat detection in Identity and Access Management (IAM) systems". International Journal of Science and Research Archive 11, n.º 2 (30 de abril de 2024): 2050–57. http://dx.doi.org/10.30574/ijsra.2024.11.2.0761.
Texto completoSingla, Ashish, Nakul Gupta, Prageet Aeron, Anshul Jain, Divya Sharma y Sangeeta Shah Bharadwaj. "Decentralized Identity Management Using Blockchain". Journal of Global Information Management 31, n.º 2 (29 de diciembre de 2022): 1–24. http://dx.doi.org/10.4018/jgim.315283.
Texto completo