Digital identity and access management technologies and frameworks /

"This book explores important and emerging advancements in digital identity and access management systems, providing innovative answers to an assortment of problems as system managers are faced with major organizational, economic and market changes"--Provided by publisher.

Bibliographic Details
Corporate Author: IGI Global.
Other Authors: Sharman, Raj., Smith, Sanjukta Das, 1978-, Gupta, Manish, 1978-
Format: Electronic
Language:English
Published: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2012.
Subjects:
Online Access:Chapter PDFs via platform:
LEADER 04652nam a2200625 a 4500
001 19452
003 IGIG
005 20120106123848.0
006 m e d
007 cr bn||||m|||a
008 111219s2012 pau fsb 000 0 eng d
010 # # |z 2011036891 
020 # # |a 9781613504994 (ebook) 
020 # # |z 9781613504987 (hbk.) 
020 # # |z 9781613505007 (print & perpetual access) 
024 7 # |a 10.4018/978-1-61350-498-7  |2 doi 
035 # # |a (CaBNVSL)gtp00550539 
035 # # |a (OCoLC)771303539 
040 # # |a CaBNVSL  |c CaBNVSL  |d CaBNVSL 
050 # 4 |a TK5105.59  |b .D54 2012e 
082 0 4 |a 005.8  |2 23 
245 0 0 |a Digital identity and access management  |b technologies and frameworks /  |c Raj Sharman, Sanjukta Das Smith and Manish Gupta, editors.  |h [electronic resource] : 
260 # # |a Hershey, Pa. :  |b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),  |c c2012. 
300 # # |a electronic texts (365 p.) :  |b digital files. 
504 # # |a Includes bibliographical references. 
505 0 # |a 1. IAM risks during organizational change and other forms of major upheaval / C. Warren Axelrod -- 2. From domain-based identity management systems to open identity management models / Ivonne Thomas and Christoph Meinel -- 3. Effective guidelines for facilitating construction of successful, advanced, user-centric IAM frameworks / Athanasios Karantjias and Nineta Polemi -- 4. Feasibility and sustainability model for identity management / Rajanish Dass and Sujoy Pal -- 5. User-centric identity management architecture using credential-holding identity agents / Daisuke Mashima ... [et al.] -- 6. Coming of age or just off the boat?: a review of contemporary identity management systems / Raj Sharman, Ryan Kendrick and Manish Gupta -- 7. Separating private and business identities / Gábor György Gulyás, Róbert Schulcz and Sándor Imre -- 8. Identity and access management architectures with a focus on user initiative / Takao Kojima and Yukio Itakura -- 9. Starting the revolution: implementing an identity management architecture / Peter White -- 10. Automatic security analysis of SAML-based single sign-on protocols / Alessandro Armando ... [et al.] -- 11. Denial of service resilience of authentication systems / Valer Bocan and Mihai Fagadar-Cosma -- 12. Identity management systems / Waleed Alrodhan -- 13. Developing proactive security dimensions for SOA / Hany F. EL Yamany, David S. Allison and Miriam A.M. Capretz -- 14. RBAC with generic rights, delegation, revocation, and constraints / Jacques Wainer, Fabio Negrello and Igor Ribeiro de Assis -- 15. Who is guarding the doors: review of authentication in E-banking / Manish Gupta, Pradeep Kumar KB and H. R. Rao -- 16. Privacy in identity and access management systems / Andreas Pashalidis and Chris J. Mitchell -- 17. Identity management / Waleed Alrodhan -- 18. Selecting and implementing identity and access management technologies: the IAM services assessment model / Peter Haag and Marco Spruit. 
506 # # |a Restricted to subscribers or individual electronic text purchasers. 
520 3 # |a "This book explores important and emerging advancements in digital identity and access management systems, providing innovative answers to an assortment of problems as system managers are faced with major organizational, economic and market changes"--Provided by publisher. 
530 # # |a Also available in print. 
538 # # |a Mode of access: World Wide Web. 
588 # # |a Description based on title screen (IGI Global, viewed December 19, 2011). 
650 # 0 |a Computer networks  |x Security measures. 
650 # 0 |a Computer networks  |x Access control. 
650 # 0 |a Computer security. 
650 # 0 |a Online identities. 
650 # 0 |a Online identity theft  |x Prevention. 
653 # # |a Access management 
653 # # |a Authentication systems 
653 # # |a Business process frameworks 
653 # # |a Digital identity and access management (DIAM) 
653 # # |a Digital credentials 
653 # # |a Digital privacy 
653 # # |a Information security 
653 # # |a Identity management 
653 # # |a Identity management systems 
653 # # |a Service oriented architectures 
653 # # |a System access rights 
700 1 # |a Sharman, Raj. 
700 1 # |a Smith, Sanjukta Das,  |d 1978- 
700 1 # |a Gupta, Manish,  |d 1978- 
710 2 # |a IGI Global. 
776 0 # |c (Original)  |w (DLC)2011036891 
776 0 8 |i Print version:  |w (DLC) 2011036891  |z 9781613504987  |z 1613504985 
856 4 1 |u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61350-498-7  |3 Chapter PDFs via platform: