Digital identity and access management: technologies and frameworks
"This book explores important and emerging advancements in digital identity and access management systems, providing innovative answers to an assortment of problems as system managers are faced with major organizational, economic and market changes" - Provided by publisher
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey PA
Information Science Reference
[2012]
|
Schriftenreihe: | Premier reference source
|
Schlagworte: | |
Online-Zugang: | DE-706 DE-1049 DE-898 DE-1050 DE-83 Volltext |
Zusammenfassung: | "This book explores important and emerging advancements in digital identity and access management systems, providing innovative answers to an assortment of problems as system managers are faced with major organizational, economic and market changes" - Provided by publisher |
Beschreibung: | Includes bibliographical references |
Beschreibung: | 1 Online-Ressource (xxi, 404 Seiten) |
ISBN: | 9781613504994 9781613505007 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV044419122 | ||
003 | DE-604 | ||
005 | 20190125 | ||
007 | cr|uuu---uuuuu | ||
008 | 170720s2012 |||| o||u| ||||||eng d | ||
020 | |a 9781613504994 |9 978-1-61350-499-4 | ||
020 | |a 9781613505007 |c print & perpetual access |9 978-1-61350-500-7 | ||
024 | 7 | |a 10.4018/978-1-61350-498-7 |2 doi | |
035 | |a (OCoLC)1002235775 | ||
035 | |a (DE-599)BVBBV044419122 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-1049 |a DE-898 |a DE-1050 |a DE-83 | ||
245 | 1 | 0 | |a Digital identity and access management |b technologies and frameworks |c Raj Sharman (State University of New York at Buffalo, USA), Sanjukta Das Smith (State University of New York at Buffalo, USA), Manish Gupta (State University of New York at Buffalo, USA) |
264 | 1 | |a Hershey PA |b Information Science Reference |c [2012] | |
264 | 4 | |c © 2012 | |
300 | |a 1 Online-Ressource (xxi, 404 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Premier reference source | |
500 | |a Includes bibliographical references | ||
505 | 8 | |a 1. IAM risks during organizational change and other forms of major upheaval / C. Warren Axelrod -- 2. From domain-based identity management systems to open identity management models / Ivonne Thomas and Christoph Meinel -- 3. Effective guidelines for facilitating construction of successful, advanced, user-centric IAM frameworks / Athanasios Karantjias and Nineta Polemi -- 4. Feasibility and sustainability model for identity management / Rajanish Dass and Sujoy Pal -- 5. User-centric identity management architecture using credential-holding identity agents / Daisuke Mashima ... [et al.] -- 6. Coming of age or just off the boat?: a review of contemporary identity management systems / Raj Sharman, Ryan Kendrick and Manish Gupta -- 7. Separating private and business identities / G abor Gy orgy Guly as, R obert Schulcz and S andor Imre -- 8. Identity and access management architectures with a focus on user initiative / Takao Kojima and Yukio Itakura -- 9. Starting the revolution: implementing an identity management architecture / Peter White -- 10. Automatic security analysis of SAML-based single sign-on protocols / Alessandro Armando ... [et al.] -- 11. Denial of service resilience of authentication systems / Valer Bocan and Mihai Fagadar-Cosma -- 12. Identity management systems / Waleed Alrodhan -- 13. Developing proactive security dimensions for SOA / Hany F. EL Yamany, David S. Allison and Miriam A.M. Capretz -- 14. RBAC with generic rights, delegation, revocation, and constraints / Jacques Wainer, Fabio Negrello and Igor Ribeiro de Assis -- 15. Who is guarding the doors: review of authentication in E-banking / Manish Gupta, Pradeep Kumar KB and H. R. Rao -- 16. Privacy in identity and access management systems / Andreas Pashalidis and Chris J. Mitchell -- 17. Identity management / Waleed Alrodhan -- 18. Selecting and implementing identity and access management technologies: the IAM services assessment model / Peter Haag and Marco Spruit | |
520 | |a "This book explores important and emerging advancements in digital identity and access management systems, providing innovative answers to an assortment of problems as system managers are faced with major organizational, economic and market changes" - Provided by publisher | ||
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Computer networks / Access control | |
650 | 4 | |a Computer security | |
650 | 4 | |a Online identities | |
650 | 4 | |a Online identity theft / Prevention | |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
700 | 1 | |a Sharman, Raj |4 edt | |
700 | 1 | |a Smith, Sanjukta Das |4 edt | |
700 | 1 | |a Gupta, Manish |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-61350-498-7 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-61350-498-5 |
856 | 4 | 0 | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61350-498-7 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB |a ZDB-1-IGE | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-029820762 | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61350-498-7 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-61350-498-7 |l DE-1049 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-61350-498-7 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-61350-498-7 |l DE-1050 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-61350-498-7 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1808138511248785408 |
---|---|
adam_text | |
any_adam_object | |
author2 | Sharman, Raj Smith, Sanjukta Das Gupta, Manish |
author2_role | edt edt edt |
author2_variant | r s rs s d s sd sds m g mg |
author_facet | Sharman, Raj Smith, Sanjukta Das Gupta, Manish |
building | Verbundindex |
bvnumber | BV044419122 |
collection | ZDB-98-IGB ZDB-1-IGE |
contents | 1. IAM risks during organizational change and other forms of major upheaval / C. Warren Axelrod -- 2. From domain-based identity management systems to open identity management models / Ivonne Thomas and Christoph Meinel -- 3. Effective guidelines for facilitating construction of successful, advanced, user-centric IAM frameworks / Athanasios Karantjias and Nineta Polemi -- 4. Feasibility and sustainability model for identity management / Rajanish Dass and Sujoy Pal -- 5. User-centric identity management architecture using credential-holding identity agents / Daisuke Mashima ... [et al.] -- 6. Coming of age or just off the boat?: a review of contemporary identity management systems / Raj Sharman, Ryan Kendrick and Manish Gupta -- 7. Separating private and business identities / G abor Gy orgy Guly as, R obert Schulcz and S andor Imre -- 8. Identity and access management architectures with a focus on user initiative / Takao Kojima and Yukio Itakura -- 9. Starting the revolution: implementing an identity management architecture / Peter White -- 10. Automatic security analysis of SAML-based single sign-on protocols / Alessandro Armando ... [et al.] -- 11. Denial of service resilience of authentication systems / Valer Bocan and Mihai Fagadar-Cosma -- 12. Identity management systems / Waleed Alrodhan -- 13. Developing proactive security dimensions for SOA / Hany F. EL Yamany, David S. Allison and Miriam A.M. Capretz -- 14. RBAC with generic rights, delegation, revocation, and constraints / Jacques Wainer, Fabio Negrello and Igor Ribeiro de Assis -- 15. Who is guarding the doors: review of authentication in E-banking / Manish Gupta, Pradeep Kumar KB and H. R. Rao -- 16. Privacy in identity and access management systems / Andreas Pashalidis and Chris J. Mitchell -- 17. Identity management / Waleed Alrodhan -- 18. Selecting and implementing identity and access management technologies: the IAM services assessment model / Peter Haag and Marco Spruit |
ctrlnum | (OCoLC)1002235775 (DE-599)BVBBV044419122 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zc 4500</leader><controlfield tag="001">BV044419122</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190125</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170720s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781613504994</subfield><subfield code="9">978-1-61350-499-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781613505007</subfield><subfield code="c">print & perpetual access</subfield><subfield code="9">978-1-61350-500-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-61350-498-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1002235775</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044419122</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Digital identity and access management</subfield><subfield code="b">technologies and frameworks</subfield><subfield code="c">Raj Sharman (State University of New York at Buffalo, USA), Sanjukta Das Smith (State University of New York at Buffalo, USA), Manish Gupta (State University of New York at Buffalo, USA)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey PA</subfield><subfield code="b">Information Science Reference</subfield><subfield code="c">[2012]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxi, 404 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">1. IAM risks during organizational change and other forms of major upheaval / C. Warren Axelrod -- 2. From domain-based identity management systems to open identity management models / Ivonne Thomas and Christoph Meinel -- 3. Effective guidelines for facilitating construction of successful, advanced, user-centric IAM frameworks / Athanasios Karantjias and Nineta Polemi -- 4. Feasibility and sustainability model for identity management / Rajanish Dass and Sujoy Pal -- 5. User-centric identity management architecture using credential-holding identity agents / Daisuke Mashima ... [et al.] -- 6. Coming of age or just off the boat?: a review of contemporary identity management systems / Raj Sharman, Ryan Kendrick and Manish Gupta -- 7. Separating private and business identities / G abor Gy orgy Guly as, R obert Schulcz and S andor Imre -- 8. Identity and access management architectures with a focus on user initiative / Takao Kojima and Yukio Itakura -- 9. Starting the revolution: implementing an identity management architecture / Peter White -- 10. Automatic security analysis of SAML-based single sign-on protocols / Alessandro Armando ... [et al.] -- 11. Denial of service resilience of authentication systems / Valer Bocan and Mihai Fagadar-Cosma -- 12. Identity management systems / Waleed Alrodhan -- 13. Developing proactive security dimensions for SOA / Hany F. EL Yamany, David S. Allison and Miriam A.M. Capretz -- 14. RBAC with generic rights, delegation, revocation, and constraints / Jacques Wainer, Fabio Negrello and Igor Ribeiro de Assis -- 15. Who is guarding the doors: review of authentication in E-banking / Manish Gupta, Pradeep Kumar KB and H. R. Rao -- 16. Privacy in identity and access management systems / Andreas Pashalidis and Chris J. Mitchell -- 17. Identity management / Waleed Alrodhan -- 18. Selecting and implementing identity and access management technologies: the IAM services assessment model / Peter Haag and Marco Spruit</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book explores important and emerging advancements in digital identity and access management systems, providing innovative answers to an assortment of problems as system managers are faced with major organizational, economic and market changes" - Provided by publisher</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Online identities</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Online identity theft / Prevention</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sharman, Raj</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Smith, Sanjukta Das</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gupta, Manish</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-61350-498-7</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-61350-498-5</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61350-498-7</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029820762</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61350-498-7</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-61350-498-7</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-61350-498-7</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-61350-498-7</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-61350-498-7</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV044419122 |
illustrated | Not Illustrated |
indexdate | 2024-08-23T01:07:38Z |
institution | BVB |
isbn | 9781613504994 9781613505007 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029820762 |
oclc_num | 1002235775 |
open_access_boolean | |
owner | DE-706 DE-1049 DE-898 DE-BY-UBR DE-1050 DE-83 |
owner_facet | DE-706 DE-1049 DE-898 DE-BY-UBR DE-1050 DE-83 |
physical | 1 Online-Ressource (xxi, 404 Seiten) |
psigel | ZDB-98-IGB ZDB-1-IGE ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Information Science Reference |
record_format | marc |
series2 | Premier reference source |
spelling | Digital identity and access management technologies and frameworks Raj Sharman (State University of New York at Buffalo, USA), Sanjukta Das Smith (State University of New York at Buffalo, USA), Manish Gupta (State University of New York at Buffalo, USA) Hershey PA Information Science Reference [2012] © 2012 1 Online-Ressource (xxi, 404 Seiten) txt rdacontent c rdamedia cr rdacarrier Premier reference source Includes bibliographical references 1. IAM risks during organizational change and other forms of major upheaval / C. Warren Axelrod -- 2. From domain-based identity management systems to open identity management models / Ivonne Thomas and Christoph Meinel -- 3. Effective guidelines for facilitating construction of successful, advanced, user-centric IAM frameworks / Athanasios Karantjias and Nineta Polemi -- 4. Feasibility and sustainability model for identity management / Rajanish Dass and Sujoy Pal -- 5. User-centric identity management architecture using credential-holding identity agents / Daisuke Mashima ... [et al.] -- 6. Coming of age or just off the boat?: a review of contemporary identity management systems / Raj Sharman, Ryan Kendrick and Manish Gupta -- 7. Separating private and business identities / G abor Gy orgy Guly as, R obert Schulcz and S andor Imre -- 8. Identity and access management architectures with a focus on user initiative / Takao Kojima and Yukio Itakura -- 9. Starting the revolution: implementing an identity management architecture / Peter White -- 10. Automatic security analysis of SAML-based single sign-on protocols / Alessandro Armando ... [et al.] -- 11. Denial of service resilience of authentication systems / Valer Bocan and Mihai Fagadar-Cosma -- 12. Identity management systems / Waleed Alrodhan -- 13. Developing proactive security dimensions for SOA / Hany F. EL Yamany, David S. Allison and Miriam A.M. Capretz -- 14. RBAC with generic rights, delegation, revocation, and constraints / Jacques Wainer, Fabio Negrello and Igor Ribeiro de Assis -- 15. Who is guarding the doors: review of authentication in E-banking / Manish Gupta, Pradeep Kumar KB and H. R. Rao -- 16. Privacy in identity and access management systems / Andreas Pashalidis and Chris J. Mitchell -- 17. Identity management / Waleed Alrodhan -- 18. Selecting and implementing identity and access management technologies: the IAM services assessment model / Peter Haag and Marco Spruit "This book explores important and emerging advancements in digital identity and access management systems, providing innovative answers to an assortment of problems as system managers are faced with major organizational, economic and market changes" - Provided by publisher Computer networks / Security measures Computer networks / Access control Computer security Online identities Online identity theft / Prevention (DE-588)4143413-4 Aufsatzsammlung gnd-content Sharman, Raj edt Smith, Sanjukta Das edt Gupta, Manish edt Erscheint auch als Druck-Ausgabe 978-1-61350-498-7 Erscheint auch als Druck-Ausgabe 1-61350-498-5 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61350-498-7 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Digital identity and access management technologies and frameworks 1. IAM risks during organizational change and other forms of major upheaval / C. Warren Axelrod -- 2. From domain-based identity management systems to open identity management models / Ivonne Thomas and Christoph Meinel -- 3. Effective guidelines for facilitating construction of successful, advanced, user-centric IAM frameworks / Athanasios Karantjias and Nineta Polemi -- 4. Feasibility and sustainability model for identity management / Rajanish Dass and Sujoy Pal -- 5. User-centric identity management architecture using credential-holding identity agents / Daisuke Mashima ... [et al.] -- 6. Coming of age or just off the boat?: a review of contemporary identity management systems / Raj Sharman, Ryan Kendrick and Manish Gupta -- 7. Separating private and business identities / G abor Gy orgy Guly as, R obert Schulcz and S andor Imre -- 8. Identity and access management architectures with a focus on user initiative / Takao Kojima and Yukio Itakura -- 9. Starting the revolution: implementing an identity management architecture / Peter White -- 10. Automatic security analysis of SAML-based single sign-on protocols / Alessandro Armando ... [et al.] -- 11. Denial of service resilience of authentication systems / Valer Bocan and Mihai Fagadar-Cosma -- 12. Identity management systems / Waleed Alrodhan -- 13. Developing proactive security dimensions for SOA / Hany F. EL Yamany, David S. Allison and Miriam A.M. Capretz -- 14. RBAC with generic rights, delegation, revocation, and constraints / Jacques Wainer, Fabio Negrello and Igor Ribeiro de Assis -- 15. Who is guarding the doors: review of authentication in E-banking / Manish Gupta, Pradeep Kumar KB and H. R. Rao -- 16. Privacy in identity and access management systems / Andreas Pashalidis and Chris J. Mitchell -- 17. Identity management / Waleed Alrodhan -- 18. Selecting and implementing identity and access management technologies: the IAM services assessment model / Peter Haag and Marco Spruit Computer networks / Security measures Computer networks / Access control Computer security Online identities Online identity theft / Prevention |
subject_GND | (DE-588)4143413-4 |
title | Digital identity and access management technologies and frameworks |
title_auth | Digital identity and access management technologies and frameworks |
title_exact_search | Digital identity and access management technologies and frameworks |
title_full | Digital identity and access management technologies and frameworks Raj Sharman (State University of New York at Buffalo, USA), Sanjukta Das Smith (State University of New York at Buffalo, USA), Manish Gupta (State University of New York at Buffalo, USA) |
title_fullStr | Digital identity and access management technologies and frameworks Raj Sharman (State University of New York at Buffalo, USA), Sanjukta Das Smith (State University of New York at Buffalo, USA), Manish Gupta (State University of New York at Buffalo, USA) |
title_full_unstemmed | Digital identity and access management technologies and frameworks Raj Sharman (State University of New York at Buffalo, USA), Sanjukta Das Smith (State University of New York at Buffalo, USA), Manish Gupta (State University of New York at Buffalo, USA) |
title_short | Digital identity and access management |
title_sort | digital identity and access management technologies and frameworks |
title_sub | technologies and frameworks |
topic | Computer networks / Security measures Computer networks / Access control Computer security Online identities Online identity theft / Prevention |
topic_facet | Computer networks / Security measures Computer networks / Access control Computer security Online identities Online identity theft / Prevention Aufsatzsammlung |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61350-498-7 |
work_keys_str_mv | AT sharmanraj digitalidentityandaccessmanagementtechnologiesandframeworks AT smithsanjuktadas digitalidentityandaccessmanagementtechnologiesandframeworks AT guptamanish digitalidentityandaccessmanagementtechnologiesandframeworks |