Identity Management: concepts, technologies, and systems
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boston, MA ; London
Artech House
2010
|
Schriftenreihe: | Artech House information security and privacy series
|
Schlagworte: | |
Beschreibung: | Print version record |
Beschreibung: | 1 online resource (196 pages) illustrations |
ISBN: | 9781608070398 1608070395 9781608070404 1608070409 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045349067 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181210s2010 |||| o||u| ||||||eng d | ||
020 | |a 9781608070398 |9 978-1-60807-039-8 | ||
020 | |a 1608070395 |9 1-60807-039-5 | ||
020 | |a 9781608070404 |9 978-1-60807-040-4 | ||
020 | |a 1608070409 |9 1-60807-040-9 | ||
035 | |a (ZDB-4-ITC)ocn700220032 | ||
035 | |a (OCoLC)700220032 | ||
035 | |a (DE-599)BVBBV045349067 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 004.62 |2 22 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Bertino, Elisa |e Verfasser |4 aut | |
245 | 1 | 0 | |a Identity Management |b concepts, technologies, and systems |c Elisa Bertino, Kenji Takahashi |
264 | 1 | |a Boston, MA ; London |b Artech House |c 2010 | |
300 | |a 1 online resource (196 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Artech House information security and privacy series | |
500 | |a Print version record | ||
505 | 8 | |a "Digital identity can be defined as the digital representation of the information known about a specific individual or organization. Digital identity management technology is an essential function in customizing and enhancing the network user experience, protecting privacy, underpinning accountability in transactions and interactions, and complying with regulatory controls. This practical resource offers you a in-depth understanding of how to design, deploy and assess identity management solutions. It provides a comprehensive overview of current trends and future directions in identity management, including best practices, the standardization landscape, and the latest research finding. Additionally, you get a clear explanation of fundamental notions and techniques that cover the entire identity lifecycle"--EBL. | |
650 | 7 | |a COMPUTERS / Networking / Network Protocols |2 bisacsh | |
650 | 7 | |a Computer network protocols |2 fast | |
650 | 7 | |a Electronic information resources |2 fast | |
650 | 4 | |a Computer network protocols |a Electronic information resources | |
650 | 0 | 7 | |a Elektronische Unterschrift |0 (DE-588)4269037-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Identitätsverwaltung |0 (DE-588)7546673-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Identitätsverwaltung |0 (DE-588)7546673-9 |D s |
689 | 0 | 1 | |a Elektronische Unterschrift |0 (DE-588)4269037-7 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Takahashi, Kenji |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |t Identity Management |d Artech House 2010 |z 9781608070398 |
912 | |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030735719 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804179172694687744 |
---|---|
any_adam_object | |
author | Bertino, Elisa |
author_facet | Bertino, Elisa |
author_role | aut |
author_sort | Bertino, Elisa |
author_variant | e b eb |
building | Verbundindex |
bvnumber | BV045349067 |
classification_rvk | ST 277 |
collection | ZDB-4-ITC |
contents | "Digital identity can be defined as the digital representation of the information known about a specific individual or organization. Digital identity management technology is an essential function in customizing and enhancing the network user experience, protecting privacy, underpinning accountability in transactions and interactions, and complying with regulatory controls. This practical resource offers you a in-depth understanding of how to design, deploy and assess identity management solutions. It provides a comprehensive overview of current trends and future directions in identity management, including best practices, the standardization landscape, and the latest research finding. Additionally, you get a clear explanation of fundamental notions and techniques that cover the entire identity lifecycle"--EBL. |
ctrlnum | (ZDB-4-ITC)ocn700220032 (OCoLC)700220032 (DE-599)BVBBV045349067 |
dewey-full | 004.62 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.62 |
dewey-search | 004.62 |
dewey-sort | 14.62 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02771nmm a2200505zc 4500</leader><controlfield tag="001">BV045349067</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2010 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781608070398</subfield><subfield code="9">978-1-60807-039-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1608070395</subfield><subfield code="9">1-60807-039-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781608070404</subfield><subfield code="9">978-1-60807-040-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1608070409</subfield><subfield code="9">1-60807-040-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn700220032</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)700220032</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045349067</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.62</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bertino, Elisa</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Identity Management</subfield><subfield code="b">concepts, technologies, and systems</subfield><subfield code="c">Elisa Bertino, Kenji Takahashi</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston, MA ; London</subfield><subfield code="b">Artech House</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (196 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Artech House information security and privacy series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">"Digital identity can be defined as the digital representation of the information known about a specific individual or organization. Digital identity management technology is an essential function in customizing and enhancing the network user experience, protecting privacy, underpinning accountability in transactions and interactions, and complying with regulatory controls. This practical resource offers you a in-depth understanding of how to design, deploy and assess identity management solutions. It provides a comprehensive overview of current trends and future directions in identity management, including best practices, the standardization landscape, and the latest research finding. Additionally, you get a clear explanation of fundamental notions and techniques that cover the entire identity lifecycle"--EBL.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Network Protocols</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer network protocols</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic information resources</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer network protocols</subfield><subfield code="a">Electronic information resources</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Elektronische Unterschrift</subfield><subfield code="0">(DE-588)4269037-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Identitätsverwaltung</subfield><subfield code="0">(DE-588)7546673-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Identitätsverwaltung</subfield><subfield code="0">(DE-588)7546673-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Elektronische Unterschrift</subfield><subfield code="0">(DE-588)4269037-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Takahashi, Kenji</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="t">Identity Management</subfield><subfield code="d">Artech House 2010</subfield><subfield code="z">9781608070398</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030735719</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV045349067 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:15:39Z |
institution | BVB |
isbn | 9781608070398 1608070395 9781608070404 1608070409 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030735719 |
oclc_num | 700220032 |
open_access_boolean | |
physical | 1 online resource (196 pages) illustrations |
psigel | ZDB-4-ITC |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Artech House |
record_format | marc |
series2 | Artech House information security and privacy series |
spelling | Bertino, Elisa Verfasser aut Identity Management concepts, technologies, and systems Elisa Bertino, Kenji Takahashi Boston, MA ; London Artech House 2010 1 online resource (196 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Artech House information security and privacy series Print version record "Digital identity can be defined as the digital representation of the information known about a specific individual or organization. Digital identity management technology is an essential function in customizing and enhancing the network user experience, protecting privacy, underpinning accountability in transactions and interactions, and complying with regulatory controls. This practical resource offers you a in-depth understanding of how to design, deploy and assess identity management solutions. It provides a comprehensive overview of current trends and future directions in identity management, including best practices, the standardization landscape, and the latest research finding. Additionally, you get a clear explanation of fundamental notions and techniques that cover the entire identity lifecycle"--EBL. COMPUTERS / Networking / Network Protocols bisacsh Computer network protocols fast Electronic information resources fast Computer network protocols Electronic information resources Elektronische Unterschrift (DE-588)4269037-7 gnd rswk-swf Identitätsverwaltung (DE-588)7546673-9 gnd rswk-swf Identitätsverwaltung (DE-588)7546673-9 s Elektronische Unterschrift (DE-588)4269037-7 s 1\p DE-604 Takahashi, Kenji Sonstige oth Erscheint auch als Druck-Ausgabe Identity Management Artech House 2010 9781608070398 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Bertino, Elisa Identity Management concepts, technologies, and systems "Digital identity can be defined as the digital representation of the information known about a specific individual or organization. Digital identity management technology is an essential function in customizing and enhancing the network user experience, protecting privacy, underpinning accountability in transactions and interactions, and complying with regulatory controls. This practical resource offers you a in-depth understanding of how to design, deploy and assess identity management solutions. It provides a comprehensive overview of current trends and future directions in identity management, including best practices, the standardization landscape, and the latest research finding. Additionally, you get a clear explanation of fundamental notions and techniques that cover the entire identity lifecycle"--EBL. COMPUTERS / Networking / Network Protocols bisacsh Computer network protocols fast Electronic information resources fast Computer network protocols Electronic information resources Elektronische Unterschrift (DE-588)4269037-7 gnd Identitätsverwaltung (DE-588)7546673-9 gnd |
subject_GND | (DE-588)4269037-7 (DE-588)7546673-9 |
title | Identity Management concepts, technologies, and systems |
title_auth | Identity Management concepts, technologies, and systems |
title_exact_search | Identity Management concepts, technologies, and systems |
title_full | Identity Management concepts, technologies, and systems Elisa Bertino, Kenji Takahashi |
title_fullStr | Identity Management concepts, technologies, and systems Elisa Bertino, Kenji Takahashi |
title_full_unstemmed | Identity Management concepts, technologies, and systems Elisa Bertino, Kenji Takahashi |
title_short | Identity Management |
title_sort | identity management concepts technologies and systems |
title_sub | concepts, technologies, and systems |
topic | COMPUTERS / Networking / Network Protocols bisacsh Computer network protocols fast Electronic information resources fast Computer network protocols Electronic information resources Elektronische Unterschrift (DE-588)4269037-7 gnd Identitätsverwaltung (DE-588)7546673-9 gnd |
topic_facet | COMPUTERS / Networking / Network Protocols Computer network protocols Electronic information resources Computer network protocols Electronic information resources Elektronische Unterschrift Identitätsverwaltung |
work_keys_str_mv | AT bertinoelisa identitymanagementconceptstechnologiesandsystems AT takahashikenji identitymanagementconceptstechnologiesandsystems |