Digital identity: [unmasking identity management architecture (IMA)]
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Beijing [u.a.]
O'Reilly
2005
|
Ausgabe: | 1. ed. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis Klappentext |
Beschreibung: | XVIII, 234 S. Ill., graph. Darst. |
ISBN: | 0596008783 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV020021022 | ||
003 | DE-604 | ||
005 | 20070516 | ||
007 | t | ||
008 | 050906s2005 ad|| |||| 00||| eng d | ||
016 | 7 | |a 97509713X |2 DE-101 | |
020 | |a 0596008783 |c Kt. : EUR 34.00 (freier Pr.) |9 0-596-00878-3 | ||
035 | |a (OCoLC)255147213 | ||
035 | |a (DE-599)BVBBV020021022 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-92 |a DE-573 |a DE-355 |a DE-29T |a DE-861 |a DE-11 |a DE-858 | ||
050 | 0 | |a TK5105.59 | |
082 | 0 | |a 005.8 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
100 | 1 | |a Windley, Phillip J. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Digital identity |b [unmasking identity management architecture (IMA)] |c Phillip J. Windley |
250 | |a 1. ed. | ||
264 | 1 | |a Beijing [u.a.] |b O'Reilly |c 2005 | |
300 | |a XVIII, 234 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Authentifikation | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Elektronische Unterschrift |0 (DE-588)4269037-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Digital Rights Management |0 (DE-588)4774276-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Elektronische Unterschrift |0 (DE-588)4269037-7 |D s |
689 | 1 | 1 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Digital Rights Management |0 (DE-588)4774276-8 |D s |
689 | 2 | |5 DE-604 | |
856 | 4 | 2 | |m Digitalisierung UB Regensburg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013342395&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Digitalisierung UB Regensburg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013342395&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Klappentext |
999 | |a oai:aleph.bib-bvb.de:BVB01-013342395 |
Datensatz im Suchindex
_version_ | 1804133583016689664 |
---|---|
adam_text | Table
Foreword
Preface
1.
Business Opportunity
Digital Identity Matters
Using Digital Identity
The Business Context of Identity
Foundational Technologies for Digital Identity
Identity Management Architectures
2.
The Language of Digital Identity
Identity Scenarios in the Physical World
Identity, Security, and Privacy
Digital Identity Perspectives
Identity Powershifts
Conclusion
3.
What Is Trust?
Trust and Evidence
Trust and Risk
Reputation and Trust Communities
Conclusion
4.
Who s Afraid of RFID? 21
Privacy Pragmatism
Privacy Drivers
Privacy Audits
Privacy Policy Capitalism
Anonymity and
Privacy Principles
Prerequisites
Conclusion
5.
Provisioning
Propagating
Using
Maintaining
Deprovisioning
Conclusion
6.
Integrity
Non-Repudiation
Confidentiality
Conclusion
7.
Authentication and Trust
Authentication Systems
Authentication System Properties
Conclusion
8.
Policy First
Authorization Patterns
Abstract Authorization Architectures
Digital Certificates and Access Control
Conclusion
vi
9.
Utah.gov: Naming and Directories
Naming
Directories
Aggregating Directory Information
Conclusion
10.
Digital Leakage
The DRM Battle
Apple iTunes: A Case Study in DRM
Features of DRM
DRM Reference Architecture
Trusted Computing Platforms
Specifying Rights
Conclusion
11.
Standards and the Digital Identity Lifecycle
Integrity and Non-Repudiation: XML Signature
Confidentiality: XML Encryption
Authentication and Authorization Assertions
Example SAML Use Cases
Identity Provisioning
Representing and Managing Authorization Policies 111
Conclusion
12.
Centralized Versus Federated Identity
The Mirage of Centralized Efficiency
Network Effects and Digital Identity Management
Federation in the Credit Card Industry
Benefits of Federated Identity
Digital Identity Standards
Three Federation Patterns
Conclusion
Table of Contents I
i un
.........133
Identity
134
The Benefits of an Identity Management Architecture
135
Success Factors
137
Roadblocks
138
Identity Management Architecture Components
140
Conclusion
141
14
.........142
IMA Lifecycle
143
IMA Governance Model
145
Initial Steps
147
Creating a Vision
147
IMA Governing Roles
148
Resources
152
What to Outsource
153
Understanding the Business Context
154
Business Function Matrix
155
IMA Principles
157
Conclusion
160
15.
..........161
Maturity Levels
162
The Maturity Model
162
The Rights Steps at the Right Time
166
Finding Identity Processes
167
Evaluating Processes
167
A Practical Action Plan
169
Filling the Gaps with Best Practices
170
Conclusion
171
16.
..........172
Build a Data Architecture
173
Processes Link Identities
174
Data Categorization
177
Identity Data Structure and Metadata
181
Exchanging Identity Data
183
Principles for Identity Data
185
Conclusion
186
viii 1
17.
Principles of a Good IF
Contents of an Identity IF
Example Interoperability Framework
A Word of Warning
Conclusion
18.
The Policy Stack
Attributes of a Good Identity Policy
Determining Policy Needs
Writing Identity Policies
An Identity Policy Suite
Assessing Identity Policies
Enforcement
Procedures
Conclusion
19.
Reference Architectures
Benefits and Pitfalls
Reference Architecture Best Practices
Using a Reference Architecture
Components of a Reference Architecture
Technical Position Statements
Consolidated Infrastructure Blueprint
System Reference Architectures
Conclusion
20.
Scoping the Process
Which Projects Are Enterprise Projects?
Sequencing the IMA Effort
A Piece at a Time
Conclusion: Dispelling IMA Myths
Index
Table of Contents I
Digital
The rise of network-based, automated services in the past decade has changed the way
businesses operate, and not always for the better. Offering services, conducting tran¬
sactions, and moving data on the Web opens new opportunities, but many CTOs and
CIOs are more concerned about the risks. Like the rulers of medieval cities, they adopt
a siege mentality, building walls to keep the bad guys out. This need for a secure perimeter often
hampers the flow of commerce.
Fortunately, some corporations are beginning to rethink how they provide security, so that interactions
with customers, employees, partners, and suppliers will be richer and more flexible. Digital Identity
explains how to go about it. This book details an important concept known as identity management
architecture (IMA): a method to provide ample protection while giving good guys access to vital
information and systems. IMA is a coherent, enterprise-wide set of standards, policies, certifications,
and management activities that enable companies like yours to manage digital identity effectively
not just as a security check, but as a way to extend services and pinpoint the needs of customers.
How does digital identity increase business opportunity? Author Phillip J. Windley s favorite example
is the ATM. With ATMs, banks can now offer around-the-clock service, serve more customers
simultaneously, and do it in a variety of new locations. Digital Identity shows CIOs, other IT
professionals, product managers, and programmers how security planning can support business
goals and opportunities, rather than holding them at bay.
Drawing on his experience as
and CIO in Governor Michael Leavitt s administration in Utah, Windley provides a rich, real-world
view of the concepts, issues, and technologies behind identity management architecture.
|
any_adam_object | 1 |
author | Windley, Phillip J. |
author_facet | Windley, Phillip J. |
author_role | aut |
author_sort | Windley, Phillip J. |
author_variant | p j w pj pjw |
building | Verbundindex |
bvnumber | BV020021022 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 276 ST 277 |
ctrlnum | (OCoLC)255147213 (DE-599)BVBBV020021022 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02350nam a2200541 c 4500</leader><controlfield tag="001">BV020021022</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20070516 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">050906s2005 ad|| |||| 00||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">97509713X</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0596008783</subfield><subfield code="c">Kt. : EUR 34.00 (freier Pr.)</subfield><subfield code="9">0-596-00878-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)255147213</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV020021022</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-92</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-858</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Windley, Phillip J.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Digital identity</subfield><subfield code="b">[unmasking identity management architecture (IMA)]</subfield><subfield code="c">Phillip J. Windley</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Beijing [u.a.]</subfield><subfield code="b">O'Reilly</subfield><subfield code="c">2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVIII, 234 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Authentifikation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Elektronische Unterschrift</subfield><subfield code="0">(DE-588)4269037-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Digital Rights Management</subfield><subfield code="0">(DE-588)4774276-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Elektronische Unterschrift</subfield><subfield code="0">(DE-588)4269037-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Digital Rights Management</subfield><subfield code="0">(DE-588)4774276-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013342395&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013342395&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Klappentext</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-013342395</subfield></datafield></record></collection> |
id | DE-604.BV020021022 |
illustrated | Illustrated |
indexdate | 2024-07-09T20:11:01Z |
institution | BVB |
isbn | 0596008783 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-013342395 |
oclc_num | 255147213 |
open_access_boolean | |
owner | DE-92 DE-573 DE-355 DE-BY-UBR DE-29T DE-861 DE-11 DE-858 |
owner_facet | DE-92 DE-573 DE-355 DE-BY-UBR DE-29T DE-861 DE-11 DE-858 |
physical | XVIII, 234 S. Ill., graph. Darst. |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | O'Reilly |
record_format | marc |
spelling | Windley, Phillip J. Verfasser aut Digital identity [unmasking identity management architecture (IMA)] Phillip J. Windley 1. ed. Beijing [u.a.] O'Reilly 2005 XVIII, 234 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Authentifikation Computer networks Security measures Internet (DE-588)4308416-3 gnd rswk-swf Elektronische Unterschrift (DE-588)4269037-7 gnd rswk-swf Digital Rights Management (DE-588)4774276-8 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Authentifikation (DE-588)4330656-1 gnd rswk-swf Authentifikation (DE-588)4330656-1 s Computersicherheit (DE-588)4274324-2 s DE-604 Elektronische Unterschrift (DE-588)4269037-7 s Internet (DE-588)4308416-3 s Digital Rights Management (DE-588)4774276-8 s Digitalisierung UB Regensburg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013342395&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Digitalisierung UB Regensburg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013342395&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Klappentext |
spellingShingle | Windley, Phillip J. Digital identity [unmasking identity management architecture (IMA)] Authentifikation Computer networks Security measures Internet (DE-588)4308416-3 gnd Elektronische Unterschrift (DE-588)4269037-7 gnd Digital Rights Management (DE-588)4774276-8 gnd Computersicherheit (DE-588)4274324-2 gnd Authentifikation (DE-588)4330656-1 gnd |
subject_GND | (DE-588)4308416-3 (DE-588)4269037-7 (DE-588)4774276-8 (DE-588)4274324-2 (DE-588)4330656-1 |
title | Digital identity [unmasking identity management architecture (IMA)] |
title_auth | Digital identity [unmasking identity management architecture (IMA)] |
title_exact_search | Digital identity [unmasking identity management architecture (IMA)] |
title_full | Digital identity [unmasking identity management architecture (IMA)] Phillip J. Windley |
title_fullStr | Digital identity [unmasking identity management architecture (IMA)] Phillip J. Windley |
title_full_unstemmed | Digital identity [unmasking identity management architecture (IMA)] Phillip J. Windley |
title_short | Digital identity |
title_sort | digital identity unmasking identity management architecture ima |
title_sub | [unmasking identity management architecture (IMA)] |
topic | Authentifikation Computer networks Security measures Internet (DE-588)4308416-3 gnd Elektronische Unterschrift (DE-588)4269037-7 gnd Digital Rights Management (DE-588)4774276-8 gnd Computersicherheit (DE-588)4274324-2 gnd Authentifikation (DE-588)4330656-1 gnd |
topic_facet | Authentifikation Computer networks Security measures Internet Elektronische Unterschrift Digital Rights Management Computersicherheit |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013342395&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013342395&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT windleyphillipj digitalidentityunmaskingidentitymanagementarchitectureima |