Contemporary identity and access management architectures: emerging research and opportunities
"This book reviews the research and development activities of a number of existing identity management architectures in privately and publicly funded organizations. It provides a holistic view of identity and access management in regard to requirements, technologies, life cycle processes, and o...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, PA
IGI Global
[2018]
|
Schlagworte: | |
Online-Zugang: | DE-1050 DE-1049 DE-83 DE-898 Volltext |
Zusammenfassung: | "This book reviews the research and development activities of a number of existing identity management architectures in privately and publicly funded organizations. It provides a holistic view of identity and access management in regard to requirements, technologies, life cycle processes, and overview of present and future commercial Identity and Access Management systems"... |
Beschreibung: | Includes bibliographical references |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9781522548294 |
DOI: | 10.4018/978-1-5225-4828-7 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV044704121 | ||
003 | DE-604 | ||
005 | 20180302 | ||
007 | cr|uuu---uuuuu | ||
008 | 180108s2018 xxu|||| o||u| ||||||eng d | ||
020 | |a 9781522548294 |9 978-1-5225-4829-4 | ||
035 | |a (OCoLC)1018463202 | ||
035 | |a (DE-599)BVBBV044704121 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-1050 |a DE-1049 |a DE-83 |a DE-898 | ||
050 | 0 | |a TK5105.59 | |
082 | 0 | |a 005.8/3 |2 23 | |
100 | 1 | |a Ng, Alex Chi Keung |d 1957- |4 aut | |
245 | 1 | 0 | |a Contemporary identity and access management architectures |b emerging research and opportunities |c Alex Chi Keung Ng |
264 | 1 | |a Hershey, PA |b IGI Global |c [2018] | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references | ||
520 | |a "This book reviews the research and development activities of a number of existing identity management architectures in privately and publicly funded organizations. It provides a holistic view of identity and access management in regard to requirements, technologies, life cycle processes, and overview of present and future commercial Identity and Access Management systems"... | ||
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer networks |x Access control | |
650 | 4 | |a Computers |x Access control | |
650 | 4 | |a Online identity theft |x Prevention | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, hardcover |z 978-1-5225-4828-7 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-5225-4828-7 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-1-IGE |a ZDB-98-IGB | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-030100782 | |
966 | e | |u https://doi.org/10.4018/978-1-5225-4828-7 |l DE-1050 |p ZDB-98-IGB |q FHD01_IGB_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-4828-7 |l DE-1049 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-4828-7 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-4828-7 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1808587704351326208 |
---|---|
adam_text | |
any_adam_object | |
author | Ng, Alex Chi Keung 1957- |
author_facet | Ng, Alex Chi Keung 1957- |
author_role | aut |
author_sort | Ng, Alex Chi Keung 1957- |
author_variant | a c k n ack ackn |
building | Verbundindex |
bvnumber | BV044704121 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-1-IGE ZDB-98-IGB |
ctrlnum | (OCoLC)1018463202 (DE-599)BVBBV044704121 |
dewey-full | 005.8/3 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/3 |
dewey-search | 005.8/3 |
dewey-sort | 15.8 13 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.4018/978-1-5225-4828-7 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 c 4500</leader><controlfield tag="001">BV044704121</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180302</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">180108s2018 xxu|||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522548294</subfield><subfield code="9">978-1-5225-4829-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1018463202</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044704121</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1050</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-898</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/3</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ng, Alex Chi Keung</subfield><subfield code="d">1957-</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Contemporary identity and access management architectures</subfield><subfield code="b">emerging research and opportunities</subfield><subfield code="c">Alex Chi Keung Ng</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, PA</subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book reviews the research and development activities of a number of existing identity management architectures in privately and publicly funded organizations. It provides a holistic view of identity and access management in regard to requirements, technologies, life cycle processes, and overview of present and future commercial Identity and Access Management systems"...</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Online identity theft</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, hardcover</subfield><subfield code="z">978-1-5225-4828-7</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-5225-4828-7</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-1-IGE</subfield><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030100782</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-4828-7</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHD01_IGB_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-4828-7</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-4828-7</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-4828-7</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV044704121 |
illustrated | Not Illustrated |
indexdate | 2024-08-28T00:07:22Z |
institution | BVB |
isbn | 9781522548294 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030100782 |
oclc_num | 1018463202 |
open_access_boolean | |
owner | DE-1050 DE-1049 DE-83 DE-898 DE-BY-UBR |
owner_facet | DE-1050 DE-1049 DE-83 DE-898 DE-BY-UBR |
physical | 1 Online-Ressource |
psigel | ZDB-1-IGE ZDB-98-IGB ZDB-98-IGB FHD01_IGB_Kauf ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | IGI Global |
record_format | marc |
spelling | Ng, Alex Chi Keung 1957- aut Contemporary identity and access management architectures emerging research and opportunities Alex Chi Keung Ng Hershey, PA IGI Global [2018] 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references "This book reviews the research and development activities of a number of existing identity management architectures in privately and publicly funded organizations. It provides a holistic view of identity and access management in regard to requirements, technologies, life cycle processes, and overview of present and future commercial Identity and Access Management systems"... Computer networks Security measures Computer networks Access control Computers Access control Online identity theft Prevention Erscheint auch als Druck-Ausgabe, hardcover 978-1-5225-4828-7 https://doi.org/10.4018/978-1-5225-4828-7 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Ng, Alex Chi Keung 1957- Contemporary identity and access management architectures emerging research and opportunities Computer networks Security measures Computer networks Access control Computers Access control Online identity theft Prevention |
title | Contemporary identity and access management architectures emerging research and opportunities |
title_auth | Contemporary identity and access management architectures emerging research and opportunities |
title_exact_search | Contemporary identity and access management architectures emerging research and opportunities |
title_full | Contemporary identity and access management architectures emerging research and opportunities Alex Chi Keung Ng |
title_fullStr | Contemporary identity and access management architectures emerging research and opportunities Alex Chi Keung Ng |
title_full_unstemmed | Contemporary identity and access management architectures emerging research and opportunities Alex Chi Keung Ng |
title_short | Contemporary identity and access management architectures |
title_sort | contemporary identity and access management architectures emerging research and opportunities |
title_sub | emerging research and opportunities |
topic | Computer networks Security measures Computer networks Access control Computers Access control Online identity theft Prevention |
topic_facet | Computer networks Security measures Computer networks Access control Computers Access control Online identity theft Prevention |
url | https://doi.org/10.4018/978-1-5225-4828-7 |
work_keys_str_mv | AT ngalexchikeung contemporaryidentityandaccessmanagementarchitecturesemergingresearchandopportunities |