Literatura científica selecionada sobre o tema "Identity access management"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Índice
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Identity access management".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Identity access management"
Pol, Mr Vinay Jayprakash. "Identity and Access Management Tools". International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (30 de junho de 2019): 796–98. http://dx.doi.org/10.31142/ijtsrd23935.
Texto completo da fonteUddin, Mumina, e David Preston. "Systematic Review of Identity Access Management in Information Security". Journal of Advances in Computer Networks 3, n.º 2 (2015): 150–56. http://dx.doi.org/10.7763/jacn.2015.v3.158.
Texto completo da fonteCarnley, P. Renee, e Houssain Kettani. "Identity and Access Management for the Internet of Things". International Journal of Future Computer and Communication 8, n.º 4 (dezembro de 2019): 129–33. http://dx.doi.org/10.18178/ijfcc.2019.8.4.554.
Texto completo da fonteKumar, Vikas, e Aashish Bhardwaj. "Identity Management Systems". International Journal of Strategic Decision Sciences 9, n.º 1 (janeiro de 2018): 63–78. http://dx.doi.org/10.4018/ijsds.2018010105.
Texto completo da fonteJin, Qiang, e Deren Kudeki. "Identity and Access Management for Libraries". Technical Services Quarterly 36, n.º 1 (2 de janeiro de 2019): 44–60. http://dx.doi.org/10.1080/07317131.2018.1532056.
Texto completo da fonteFuchs, Ludwig, e Günther Pernul. "Qualitätssicherung im Identity- und Access Management". HMD Praxis der Wirtschaftsinformatik 50, n.º 1 (fevereiro de 2013): 88–97. http://dx.doi.org/10.1007/bf03340780.
Texto completo da fontePawar, Pratik. "KeyHound - Identity Provider and Access Management". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n.º 04 (9 de abril de 2024): 1–5. http://dx.doi.org/10.55041/ijsrem30444.
Texto completo da fonteMartin, Luther. "Identity-based Encryption: From Identity and Access Management to Enterprise Privacy Management". Information Systems Security 16, n.º 1 (28 de março de 2007): 9–14. http://dx.doi.org/10.1080/10658980601051268.
Texto completo da fonteSaloni Kumari. "Identity and access management: "Elevating security and efficiency: Unveiling the crucial aspects of identity and access management”". International Journal of Engineering & Technology 12, n.º 1 (6 de setembro de 2023): 11–14. http://dx.doi.org/10.14419/ijet.v12i1.32333.
Texto completo da fonteDhamdhere, Mayuri, Shridevi Karande e Madhura Phatak. "Peer Group Analysis in Identity and Access Management to Identify Anomalies". International Journal of Engineering and Technology 9, n.º 3S (17 de julho de 2017): 116–21. http://dx.doi.org/10.21817/ijet/2017/v9i3/170903s020.
Texto completo da fonteTeses / dissertações sobre o assunto "Identity access management"
Fryaufová, Lucie. "Řízení identit v organizacích". Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-162629.
Texto completo da fonteJaferian, Pooya. "User-centered design of identity and access management systems". Thesis, University of British Columbia, 2014. http://hdl.handle.net/2429/51243.
Texto completo da fonteApplied Science, Faculty of
Electrical and Computer Engineering, Department of
Graduate
Kotora, Ondřej. "Centralizovaná správa rolí". Master's thesis, Vysoká škola ekonomická v Praze, 2008. http://www.nusl.cz/ntk/nusl-3371.
Texto completo da fonteRhermini, Siham. "Identity, Access Management and Single Sign-On Web-based Solutions". Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-92235.
Texto completo da fonteHummer, Matthias [Verfasser], Günther [Akademischer Betreuer] Pernul e Dogan [Akademischer Betreuer] Kesdogan. "Sustainable Identity and Access Management / Matthias Hummer ; Günther Pernul, Dogan Kesdogan". Regensburg : Universitätsbibliothek Regensburg, 2019. http://d-nb.info/1189905426/34.
Texto completo da fonteHummer, Matthias Verfasser], Günther [Akademischer Betreuer] [Pernul e Dogan [Akademischer Betreuer] Kesdogan. "Sustainable Identity and Access Management / Matthias Hummer ; Günther Pernul, Dogan Kesdogan". Regensburg : Universitätsbibliothek Regensburg, 2019. http://nbn-resolving.de/urn:nbn:de:bvb:355-epub-403116.
Texto completo da fonteDeas, Matthew Burns. "Towards a user centric model for identity and access management within the online environment". Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/775.
Texto completo da fonteFilipsson, Emma. "Modelling and simulating Identity and Access Management based lateral movement in a cloud infrastructure". Thesis, KTH, Fysik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-252836.
Texto completo da fonteEngström, Pontus. "Exploring the non-technical challenges : A case study of identity and access management projects". Thesis, KTH, Skolan för industriell teknik och management (ITM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-256228.
Texto completo da fonteEn IAM implementeringen är en komplex och utdragen process som kan ta flera år samt skapar en förändringsresa hos kund. I sin natur skapas flera utmaningar till olika involverade aktörer. Tidigare forskning har främst fokuserat på de tekniska komponenterna som en IAM lösning baseras på, därav de tekniska utmaningarna som tillkommer. Till följd har de icke-tekniska utmaningarna inom IAM projekt och utmaningarna med en implementation hos kund fått bristande uppmärksamhet där få studier har genomförts. Syftet med detta examensarbete är att visualisera de utmaningar som uppstår vid en IAM implementering. Arbetet fokuserar även på utmaningarna med organisatorisk förändring, vilket genomförandet av en IAM lösning skapar. Den primära datainsamlingen genomförs av halvstrukturerade intervjuer med personer inom IAM-branschen. Dessutom samlas sekundär data in från informationssystem (IS) och informationsteknik (IT) projekt samt outsourcingprojekt. Därtill några icke akademiska rapporter med fördjupande information om IAM implementeringar. Examensarbetet är gjort som en kvalitativ fallstudie av IAM implementeringar, detta för att förstå komplexiteten av ämnet. Resultatet visar utmaningar som Insikt, Kommunikation och Uthållighet, vilket tenderar att vara hinder för alla involverade aktörer. Dessutom beskriver de organisatoriska förändringarna tre ytterligare utmaningar för Förankring, Kommunikation och Vision. Dessa utmaningar förekommer hos kund som implementerar en IAM lösning. Uppsatsen visar sammanhängande och osammanhängande aspekter med forskningen inom IS/IT projekt och IAM projekt. Dessutom framhävs nya upptäckta insikter som bidrar till forskningsområdena. Slutligen sammanfattas arbetet med några implikationer samt förslag på vidare forskning.
Callahan, Michael John. "Exploring Identity Management at Community Colleges in Texas with Open Access to College Computer Networks". ScholarWorks, 2011. https://scholarworks.waldenu.edu/dissertations/1641.
Texto completo da fonteLivros sobre o assunto "Identity access management"
Rawal, Bharat S., Gunasekaran Manogaran e Alexender Peter. Cybersecurity and Identity Access Management. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-2658-7.
Texto completo da fontePremdeep, Banga, e Carroll Brandon, eds. AAA identity management security. Indianapolis, Ind: Cisco Press, 2011.
Encontre o texto completo da fonteRamey, Kenneth. Pro Oracle Identity and Access Management Suite. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1521-0.
Texto completo da fontePohlman, Marlin B. Oracle Identity Management. London: Taylor and Francis, 2008.
Encontre o texto completo da fonteAccess and identity management for libraries: Controlling access to online information. London: Facet, 2006.
Encontre o texto completo da fonteDigital identity and access management: Technologies and frameworks. Hershey, PA: Information Science Reference, 2012.
Encontre o texto completo da fonteInternational Business Machines Corporation. International Technical Support Organization, ed. Identity management design guide with IBM Tivoli identity manger. 3a ed. [Austin, Tex.]: IBM International Technical Support Organization, 2009.
Encontre o texto completo da fonteInternational Business Machines Corporation. International Technical Support Organization, ed. Identity management design guide with IBM Tivoli identity manager. 4a ed. [Poughkeepsie, NY]: IBM International Technical Support Organization, 2009.
Encontre o texto completo da fonteAccess control systems: Security, identity, management, and trust models. New York: Springer, 2005.
Encontre o texto completo da fonteUnderstanding SAP NetWeaver Identity management. Boston: SAP and Galileo Press, 2010.
Encontre o texto completo da fonteCapítulos de livros sobre o assunto "Identity access management"
D’Oliveiro, Michael. "Identity access management". In The Streaming Media Guide, 100–118. Abingdon, Oxon ; New York, NY : Routledge, 2019.: Routledge, 2019. http://dx.doi.org/10.4324/9780429429750-7.
Texto completo da fonteHaber, Morey J., e Darran Rolls. "Privileged Access Management". In Identity Attack Vectors, 137–50. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5165-2_13.
Texto completo da fonteHaber, Morey J., e Darran Rolls. "Privileged Access Management (PAM)". In Identity Attack Vectors, 65–79. Berkeley, CA: Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0233-1_8.
Texto completo da fonteSturrus, Edwin, e Olga Kulikova. "Identity and Access Management". In Encyclopedia of Cloud Computing, 396–405. Chichester, UK: John Wiley & Sons, Ltd, 2016. http://dx.doi.org/10.1002/9781118821930.ch33.
Texto completo da fontePng, Adrian, e Luc Demanche. "Identity and Access Management". In Getting Started with Oracle Cloud Free Tier, 17–34. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6011-1_2.
Texto completo da fonteDanturthi, R. Sarma. "Identity and Access Management". In 70 Tips and Tricks for Mastering the CISSP Exam, 207–23. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6225-2_5.
Texto completo da fonteRobichau, Bernard Peter. "Identity and Access Management". In Healthcare Information Privacy and Security, 69–80. Berkeley, CA: Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6677-8_7.
Texto completo da fonteBeach, Brian. "Identity and Access Management". In Pro Powershell for Amazon Web Services, 193–214. Berkeley, CA: Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6452-1_11.
Texto completo da fonteBeach, Brian, Steven Armentrout, Rodney Bozo e Emmanuel Tsouris. "Identity and Access Management". In Pro PowerShell for Amazon Web Services, 199–235. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4850-8_9.
Texto completo da fonteOts, Karl. "Identity and Access Management". In Azure Security Handbook, 11–38. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7292-3_2.
Texto completo da fonteTrabalhos de conferências sobre o assunto "Identity access management"
WeiYi Liu, Yue Tan e Enwei Zhang. "Service token for identity access management". In 2009 IEEE Asia-Pacific Services Computing Conference (APSCC). IEEE, 2009. http://dx.doi.org/10.1109/apscc.2009.5394143.
Texto completo da fonteKao, Min-Chih, Yi-Shiung Yeh e Chuan-Chi Wang. "Untraceable Identity Management Framework for Mobile Access". In 2008 Eighth International Conference on Intelligent Systems Design and Applications (ISDA). IEEE, 2008. http://dx.doi.org/10.1109/isda.2008.248.
Texto completo da fonteSharma, Anuja, Sarita Sharma e Meenu Dave. "Identity and access management- a comprehensive study". In 2015 International Conference on Green Computing and Internet of Things (ICGCIoT). IEEE, 2015. http://dx.doi.org/10.1109/icgciot.2015.7380701.
Texto completo da fonteYang, Yan, Xingyuan Chen, Guangxia Wang e Lifeng Cao. "An Identity and Access Management Architecture in Cloud". In 2014 7th International Symposium on Computational Intelligence and Design (ISCID). IEEE, 2014. http://dx.doi.org/10.1109/iscid.2014.221.
Texto completo da fonteFaraji, Mohammad, Joon-Myung Kang, Hadi Bannazadeh e Alberto Leon-Garcia. "Identity access management for Multi-tier cloud infrastructures". In NOMS 2014 - 2014 IEEE/IFIP Network Operations and Management Symposium. IEEE, 2014. http://dx.doi.org/10.1109/noms.2014.6838229.
Texto completo da fonteKatsikogiannis, Georgios, Sarandis Mitropoulos e Christos Douligeris. "An Identity and Access Management approach for SOA". In 2016 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT). IEEE, 2016. http://dx.doi.org/10.1109/isspit.2016.7886021.
Texto completo da fonteIndu, I., e P. M. Rubesh Anand. "Identity and access management for cloud web services". In 2015 IEEE Recent Advances in Intelligent Computational Systems (RAICS). IEEE, 2015. http://dx.doi.org/10.1109/raics.2015.7488450.
Texto completo da fonteVisvanathan, Raja, J. P. Singh Joorel e Gopinath Ganapathy. "A New Landscape of Identity Access Management Federation". In 2023 International Conference on Computer Science and Emerging Technologies (CSET). IEEE, 2023. http://dx.doi.org/10.1109/cset58993.2023.10346708.
Texto completo da fonteShehu, Abubakar-Sadiq, António Pinto e Manuel Correia. "Providing Secured Access Delegation in Identity Management Systems". In 17th International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2020. http://dx.doi.org/10.5220/0009892206380644.
Texto completo da fonteExtros, Savio, e T. N. Nisha. "Conceptual framework for adaptive access and identity management". In INTERNATIONAL CONFERENCE ON INNOVATIONS IN ROBOTICS, INTELLIGENT AUTOMATION AND CONTROL. AIP Publishing, 2023. http://dx.doi.org/10.1063/5.0175831.
Texto completo da fonteRelatórios de organizações sobre o assunto "Identity access management"
McCarthy, Jim, Don Faatz, Harry Perper, Chris Peloquin, John Wiltberger e Leah Kauffman. Identity and access management for electric utilities. Gaithersburg, MD: National Institute of Standards and Technology, julho de 2018. http://dx.doi.org/10.6028/nist.sp.1800-2.
Texto completo da fonteHarbitz, Mia Elisabeth. The Civil Registry: A Neglected Dimension of International Development. Inter-American Development Bank, maio de 2013. http://dx.doi.org/10.18235/0009117.
Texto completo da fonteKetterer, Juan Antonio, e Agustina Calatayud. Integrated Value Chain Risk Management. Inter-American Development Bank, janeiro de 2016. http://dx.doi.org/10.18235/0010631.
Texto completo da fonteBaena Olabe, Paloma, e Juan Cruz Vieyra. Access to Information and Targeted Transparency Policies. Inter-American Development Bank, novembro de 2011. http://dx.doi.org/10.18235/0009022.
Texto completo da fonteGwin, Catherine, Mayra Ruiz, Saleema Vellani e Alejandro Guerrero. IDB-9: Access to Information. Inter-American Development Bank, março de 2013. http://dx.doi.org/10.18235/0010517.
Texto completo da fonteShaheen, Susan, Elliot Shaheen, Adam Cohen, Jacquelyn Broader e Richard Davis. Managing the Curb: Understanding the Impacts of On-Demand Mobility on Public Transit, Micromobility, and Pedestrians. Mineta Transportation Institute, julho de 2022. http://dx.doi.org/10.31979/mti.2022.1904.
Texto completo da fonteMaletta, Giovanna, e Mike Lewis. Post-shipment On-site Inspections and Stockpile Management Assistance: Bridging Gaps. Stockholm International Peace Research Institute, agosto de 2022. http://dx.doi.org/10.55163/ulfp1679.
Texto completo da fonteButcher, Neil, e Alison Zimmermann. Opportunities and Challenges for EMIS Implementation in the Caribbean. Inter-American Development Bank, agosto de 2023. http://dx.doi.org/10.18235/0005071.
Texto completo da fonteKatz, Aron, Mark Johnson e Jinelle Sperry. Environmental DNA sampling for at-risk and invasive species management on military ranges : guidelines and protocols for installation biologists and land managers. Engineer Research and Development Center (U.S.), março de 2024. http://dx.doi.org/10.21079/11681/48275.
Texto completo da fonteKennedy, Alan, David Moore e Taylor Rycroft. Field survey to prioritize needs for modernizing dredged material evaluation guidance. Engineer Research and Development Center (U.S.), maio de 2021. http://dx.doi.org/10.21079/11681/40701.
Texto completo da fonte