|
|
|
|
LEADER |
04652nam a2200625 a 4500 |
001 |
19452 |
003 |
IGIG |
005 |
20120106123848.0 |
006 |
m e d |
007 |
cr bn||||m|||a |
008 |
111219s2012 pau fsb 000 0 eng d |
010 |
# |
# |
|z 2011036891
|
020 |
# |
# |
|a 9781613504994 (ebook)
|
020 |
# |
# |
|z 9781613504987 (hbk.)
|
020 |
# |
# |
|z 9781613505007 (print & perpetual access)
|
024 |
7 |
# |
|a 10.4018/978-1-61350-498-7
|2 doi
|
035 |
# |
# |
|a (CaBNVSL)gtp00550539
|
035 |
# |
# |
|a (OCoLC)771303539
|
040 |
# |
# |
|a CaBNVSL
|c CaBNVSL
|d CaBNVSL
|
050 |
# |
4 |
|a TK5105.59
|b .D54 2012e
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
0 |
0 |
|a Digital identity and access management
|b technologies and frameworks /
|c Raj Sharman, Sanjukta Das Smith and Manish Gupta, editors.
|h [electronic resource] :
|
260 |
# |
# |
|a Hershey, Pa. :
|b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
|c c2012.
|
300 |
# |
# |
|a electronic texts (365 p.) :
|b digital files.
|
504 |
# |
# |
|a Includes bibliographical references.
|
505 |
0 |
# |
|a 1. IAM risks during organizational change and other forms of major upheaval / C. Warren Axelrod -- 2. From domain-based identity management systems to open identity management models / Ivonne Thomas and Christoph Meinel -- 3. Effective guidelines for facilitating construction of successful, advanced, user-centric IAM frameworks / Athanasios Karantjias and Nineta Polemi -- 4. Feasibility and sustainability model for identity management / Rajanish Dass and Sujoy Pal -- 5. User-centric identity management architecture using credential-holding identity agents / Daisuke Mashima ... [et al.] -- 6. Coming of age or just off the boat?: a review of contemporary identity management systems / Raj Sharman, Ryan Kendrick and Manish Gupta -- 7. Separating private and business identities / Gábor György Gulyás, Róbert Schulcz and Sándor Imre -- 8. Identity and access management architectures with a focus on user initiative / Takao Kojima and Yukio Itakura -- 9. Starting the revolution: implementing an identity management architecture / Peter White -- 10. Automatic security analysis of SAML-based single sign-on protocols / Alessandro Armando ... [et al.] -- 11. Denial of service resilience of authentication systems / Valer Bocan and Mihai Fagadar-Cosma -- 12. Identity management systems / Waleed Alrodhan -- 13. Developing proactive security dimensions for SOA / Hany F. EL Yamany, David S. Allison and Miriam A.M. Capretz -- 14. RBAC with generic rights, delegation, revocation, and constraints / Jacques Wainer, Fabio Negrello and Igor Ribeiro de Assis -- 15. Who is guarding the doors: review of authentication in E-banking / Manish Gupta, Pradeep Kumar KB and H. R. Rao -- 16. Privacy in identity and access management systems / Andreas Pashalidis and Chris J. Mitchell -- 17. Identity management / Waleed Alrodhan -- 18. Selecting and implementing identity and access management technologies: the IAM services assessment model / Peter Haag and Marco Spruit.
|
506 |
# |
# |
|a Restricted to subscribers or individual electronic text purchasers.
|
520 |
3 |
# |
|a "This book explores important and emerging advancements in digital identity and access management systems, providing innovative answers to an assortment of problems as system managers are faced with major organizational, economic and market changes"--Provided by publisher.
|
530 |
# |
# |
|a Also available in print.
|
538 |
# |
# |
|a Mode of access: World Wide Web.
|
588 |
# |
# |
|a Description based on title screen (IGI Global, viewed December 19, 2011).
|
650 |
# |
0 |
|a Computer networks
|x Security measures.
|
650 |
# |
0 |
|a Computer networks
|x Access control.
|
650 |
# |
0 |
|a Computer security.
|
650 |
# |
0 |
|a Online identities.
|
650 |
# |
0 |
|a Online identity theft
|x Prevention.
|
653 |
# |
# |
|a Access management
|
653 |
# |
# |
|a Authentication systems
|
653 |
# |
# |
|a Business process frameworks
|
653 |
# |
# |
|a Digital identity and access management (DIAM)
|
653 |
# |
# |
|a Digital credentials
|
653 |
# |
# |
|a Digital privacy
|
653 |
# |
# |
|a Information security
|
653 |
# |
# |
|a Identity management
|
653 |
# |
# |
|a Identity management systems
|
653 |
# |
# |
|a Service oriented architectures
|
653 |
# |
# |
|a System access rights
|
700 |
1 |
# |
|a Sharman, Raj.
|
700 |
1 |
# |
|a Smith, Sanjukta Das,
|d 1978-
|
700 |
1 |
# |
|a Gupta, Manish,
|d 1978-
|
710 |
2 |
# |
|a IGI Global.
|
776 |
0 |
# |
|c (Original)
|w (DLC)2011036891
|
776 |
0 |
8 |
|i Print version:
|w (DLC) 2011036891
|z 9781613504987
|z 1613504985
|
856 |
4 |
1 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61350-498-7
|3 Chapter PDFs via platform:
|