Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Identity access management“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Identity access management" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Identity access management"
Pol, Mr Vinay Jayprakash. "Identity and Access Management Tools." International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (2019): 796–98. http://dx.doi.org/10.31142/ijtsrd23935.
Der volle Inhalt der QuelleKalwani, Seema. "Identity Access Management, Identity Governance Administration, Privileged Access Management differences, tools and applications." International Journal of Multidisciplinary Research and Growth Evaluation 6, no. 2 (2025): 1832–39. https://doi.org/10.54660/.ijmrge.2025.6.2.1832-1839.
Der volle Inhalt der QuelleHariharan, Ramanan. "AI-Driven Identity and Access Management in Enterprise Systems." International journal of IoT 05, no. 01 (2025): 62–94. https://doi.org/10.55640/ijiot-05-01-05.
Der volle Inhalt der QuelleUddin, Mumina, and David Preston. "Systematic Review of Identity Access Management in Information Security." Journal of Advances in Computer Networks 3, no. 2 (2015): 150–56. http://dx.doi.org/10.7763/jacn.2015.v3.158.
Der volle Inhalt der QuelleCarnley, P. Renee, and Houssain Kettani. "Identity and Access Management for the Internet of Things." International Journal of Future Computer and Communication 8, no. 4 (2019): 129–33. http://dx.doi.org/10.18178/ijfcc.2019.8.4.554.
Der volle Inhalt der QuelleMr., Vinay Jayprakash Pol. "Identity and Access Management Tools." International Journal of Trend in Scientific Research and Development 3, no. 4 (2019): 796–98. https://doi.org/10.31142/ijtsrd23935.
Der volle Inhalt der QuelleVenkata, Soma. "Cloud Identity and Access Management." European Journal of Advances in Engineering and Technology 8, no. 7 (2021): 113–17. https://doi.org/10.5281/zenodo.13762453.
Der volle Inhalt der QuelleKrishnapatnam, Mahendra. "Enhancing Healthcare Security with AI-Driven Identity and Access Management." International Journal of Science and Research (IJSR) 14, no. 2 (2025): 835–38. https://doi.org/10.21275/sr25212205041.
Der volle Inhalt der QuelleKumar, Vikas, and Aashish Bhardwaj. "Identity Management Systems." International Journal of Strategic Decision Sciences 9, no. 1 (2018): 63–78. http://dx.doi.org/10.4018/ijsds.2018010105.
Der volle Inhalt der QuelleJin, Qiang, and Deren Kudeki. "Identity and Access Management for Libraries." Technical Services Quarterly 36, no. 1 (2019): 44–60. http://dx.doi.org/10.1080/07317131.2018.1532056.
Der volle Inhalt der QuelleDissertationen zum Thema "Identity access management"
Fryaufová, Lucie. "Řízení identit v organizacích." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-162629.
Der volle Inhalt der QuelleJaferian, Pooya. "User-centered design of identity and access management systems." Thesis, University of British Columbia, 2014. http://hdl.handle.net/2429/51243.
Der volle Inhalt der QuelleKotora, Ondřej. "Centralizovaná správa rolí." Master's thesis, Vysoká škola ekonomická v Praze, 2008. http://www.nusl.cz/ntk/nusl-3371.
Der volle Inhalt der QuelleRhermini, Siham. "Identity, Access Management and Single Sign-On Web-based Solutions." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-92235.
Der volle Inhalt der QuelleHummer, Matthias [Verfasser], Günther [Akademischer Betreuer] Pernul, and Dogan [Akademischer Betreuer] Kesdogan. "Sustainable Identity and Access Management / Matthias Hummer ; Günther Pernul, Dogan Kesdogan." Regensburg : Universitätsbibliothek Regensburg, 2019. http://d-nb.info/1189905426/34.
Der volle Inhalt der QuelleHummer, Matthias Verfasser], Günther [Akademischer Betreuer] [Pernul, and Dogan [Akademischer Betreuer] Kesdogan. "Sustainable Identity and Access Management / Matthias Hummer ; Günther Pernul, Dogan Kesdogan." Regensburg : Universitätsbibliothek Regensburg, 2019. http://nbn-resolving.de/urn:nbn:de:bvb:355-epub-403116.
Der volle Inhalt der QuelleDeas, Matthew Burns. "Towards a user centric model for identity and access management within the online environment." Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/775.
Der volle Inhalt der QuelleFilipsson, Emma. "Modelling and simulating Identity and Access Management based lateral movement in a cloud infrastructure." Thesis, KTH, Fysik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-252836.
Der volle Inhalt der QuelleEngström, Pontus. "Exploring the non-technical challenges : A case study of identity and access management projects." Thesis, KTH, Skolan för industriell teknik och management (ITM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-256228.
Der volle Inhalt der QuelleCallahan, Michael John. "Exploring Identity Management at Community Colleges in Texas with Open Access to College Computer Networks." ScholarWorks, 2011. https://scholarworks.waldenu.edu/dissertations/1641.
Der volle Inhalt der QuelleBücher zum Thema "Identity access management"
Rawal, Bharat S., Gunasekaran Manogaran, and Alexender Peter. Cybersecurity and Identity Access Management. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-2658-7.
Der volle Inhalt der QuelleRamey, Kenneth. Pro Oracle Identity and Access Management Suite. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1521-0.
Der volle Inhalt der QuellePohlman, Marlin B. Oracle Identity Management. Taylor and Francis, 2008.
Den vollen Inhalt der Quelle findenTodorov, Dobromir. Mechanics of user identificatlion and authentication: Fundamentals of identity management. Auerbach Pub, 2007.
Den vollen Inhalt der Quelle findenOrondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Information Science Reference, 2010.
Den vollen Inhalt der Quelle findenOrondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Information Science Reference, 2010.
Den vollen Inhalt der Quelle findenOrondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Information Science Reference, 2010.
Den vollen Inhalt der Quelle findenOrondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Information Science Reference, 2010.
Den vollen Inhalt der Quelle findenPohlman, Marlin B. Oracle identity management: Governance, risk, and compliance architecture. 3rd ed. Auerbach Publications, 2008.
Den vollen Inhalt der Quelle findenGroup, Butler, ed. Identity and access management: Building a security framework using single sign-on and authentication technology. Butler Direct Limited, 2003.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Identity access management"
D’Oliveiro, Michael. "Identity access management." In The Streaming Media Guide. Routledge, 2019. http://dx.doi.org/10.4324/9780429429750-7.
Der volle Inhalt der QuelleHaber, Morey J., and Darran Rolls. "Privileged Access Management." In Identity Attack Vectors. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5165-2_13.
Der volle Inhalt der QuelleHaber, Morey J., and Darran Rolls. "Privileged Access Management (PAM)." In Identity Attack Vectors. Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0233-1_8.
Der volle Inhalt der QuelleSturrus, Edwin, and Olga Kulikova. "Identity and Access Management." In Encyclopedia of Cloud Computing. John Wiley & Sons, Ltd, 2016. http://dx.doi.org/10.1002/9781118821930.ch33.
Der volle Inhalt der QuellePng, Adrian, and Luc Demanche. "Identity and Access Management." In Getting Started with Oracle Cloud Free Tier. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6011-1_2.
Der volle Inhalt der QuelleDanturthi, R. Sarma. "Identity and Access Management." In 70 Tips and Tricks for Mastering the CISSP Exam. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6225-2_5.
Der volle Inhalt der QuelleRobichau, Bernard Peter. "Identity and Access Management." In Healthcare Information Privacy and Security. Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6677-8_7.
Der volle Inhalt der QuelleBeach, Brian. "Identity and Access Management." In Pro Powershell for Amazon Web Services. Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6452-1_11.
Der volle Inhalt der QuelleBeach, Brian, Steven Armentrout, Rodney Bozo, and Emmanuel Tsouris. "Identity and Access Management." In Pro PowerShell for Amazon Web Services. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4850-8_9.
Der volle Inhalt der QuelleOts, Karl. "Identity and Access Management." In Azure Security Handbook. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7292-3_2.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Identity access management"
Singh, Abhishek Pratap, Ievgeniia Kuzminykh, and Bogdan Ghita. "Industry Perception of Security Challenges with Identity Access Management Solutions." In 2024 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom). IEEE, 2024. http://dx.doi.org/10.1109/blackseacom61746.2024.10646296.
Der volle Inhalt der QuelleVoicu, Vladimir, Dorin Petreuş, Emil Cebuc, and Silviu Băjenaru Marcu. "University Identity and Access Management Infrastructure with Keycloak: Lessons Learned." In 2024 23rd RoEduNet Conference: Networking in Education and Research (RoEduNet). IEEE, 2024. http://dx.doi.org/10.1109/roedunet64292.2024.10722517.
Der volle Inhalt der QuelleNosouhi, Mohammad Reza, Zubair Baig, Robin Doss, et al. "The Value of Strong Identity and Access Management for ICS/OT Security." In 2024 21st Annual International Conference on Privacy, Security and Trust (PST). IEEE, 2024. https://doi.org/10.1109/pst62714.2024.10788047.
Der volle Inhalt der QuelleLakshmi, J. Maha, Krishna Prasad, P. Samson Anosh Babu, and Ravikumar Ch. "A Decentralized Approach for Enhancing Identity and Access Management through Blockchain Integration." In 2024 IEEE 6th International Conference on Cybernetics, Cognition and Machine Learning Applications (ICCCMLA). IEEE, 2024. https://doi.org/10.1109/icccmla63077.2024.10871512.
Der volle Inhalt der QuelleCuzzocrea, Alfredo, and Islam Belmerabet. "Privacy-Preserving Identity and Access Management in Multiple Cloud Environments: Models, Issues, and Solutions." In 2024 IEEE International Conference on Big Data (BigData). IEEE, 2024. https://doi.org/10.1109/bigdata62323.2024.10826004.
Der volle Inhalt der QuelleAttaluri, Vivek Chowdary, Muniraju Hullurappa, Ravikumar Batchu, Lakshmi Narasimha Raju Mudunuri, Gopichand Vemulapalli, and Naga Ramesh Palakurti. "Identity Access Management for Network Devices: Enhancing Security of Modern IT Infrastructure in Healthcare." In 2025 International Conference on Data Science and Business Systems (ICDSBS). IEEE, 2025. https://doi.org/10.1109/icdsbs63635.2025.11032042.
Der volle Inhalt der QuelleTsoodol, Lkhamrolom, Munkhnasan Tuvdendorj, Javkhlan Rentsendorj, and Oyun-Erdene Namsrai. "Implementing Unified Identity and Access Management System: Case Study for the National University of Mongolia." In 2024 IEEE 9th International Conference on Data Science in Cyberspace (DSC). IEEE, 2024. https://doi.org/10.1109/dsc63484.2024.00124.
Der volle Inhalt der QuelleMorris, Vinton, and Kevin Kornegay. "Flow Table Modification Using Behavioral-Based Fingerprinting Technique to Facilitate Zero Trust Identity Management and Access Control." In 2025 IEEE 15th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 2025. https://doi.org/10.1109/ccwc62904.2025.10903861.
Der volle Inhalt der QuelleDemirsoy, H. Burak, Ezgi Nur Kose, Furkan Aydogan, Muhammed H. Ezgin, and M. Ali Akcayol. "Hybrid Deep Learning Model Based Advanced AI-Driven Identity and Access Management System for Enhanced Security and Efficiency." In 2024 8th International Symposium on Innovative Approaches in Smart Technologies (ISAS). IEEE, 2024. https://doi.org/10.1109/isas64331.2024.10845215.
Der volle Inhalt der QuelleWeiYi Liu, Yue Tan, and Enwei Zhang. "Service token for identity access management." In 2009 IEEE Asia-Pacific Services Computing Conference (APSCC). IEEE, 2009. http://dx.doi.org/10.1109/apscc.2009.5394143.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Identity access management"
McCarthy, Jim, Don Faatz, Harry Perper, Chris Peloquin, John Wiltberger, and Leah Kauffman. Identity and access management for electric utilities. National Institute of Standards and Technology, 2018. http://dx.doi.org/10.6028/nist.sp.1800-2.
Der volle Inhalt der QuelleHarbitz, Mia Elisabeth. The Civil Registry: A Neglected Dimension of International Development. Inter-American Development Bank, 2013. http://dx.doi.org/10.18235/0009117.
Der volle Inhalt der QuelleKetterer, Juan Antonio, and Agustina Calatayud. Integrated Value Chain Risk Management. Inter-American Development Bank, 2016. http://dx.doi.org/10.18235/0010631.
Der volle Inhalt der QuelleBaena Olabe, Paloma, and Juan Cruz Vieyra. Access to Information and Targeted Transparency Policies. Inter-American Development Bank, 2011. http://dx.doi.org/10.18235/0009022.
Der volle Inhalt der QuelleGwin, Catherine, Mayra Ruiz, Saleema Vellani, and Alejandro Guerrero. IDB-9: Access to Information. Inter-American Development Bank, 2013. http://dx.doi.org/10.18235/0010517.
Der volle Inhalt der QuelleShaheen, Susan, Elliot Shaheen, Adam Cohen, Jacquelyn Broader, and Richard Davis. Managing the Curb: Understanding the Impacts of On-Demand Mobility on Public Transit, Micromobility, and Pedestrians. Mineta Transportation Institute, 2022. http://dx.doi.org/10.31979/mti.2022.1904.
Der volle Inhalt der QuelleMaletta, Giovanna, and Mike Lewis. Post-shipment On-site Inspections and Stockpile Management Assistance: Bridging Gaps. Stockholm International Peace Research Institute, 2022. http://dx.doi.org/10.55163/ulfp1679.
Der volle Inhalt der QuelleButcher, Neil, and Alison Zimmermann. Opportunities and Challenges for EMIS Implementation in the Caribbean. Inter-American Development Bank, 2023. http://dx.doi.org/10.18235/0005071.
Der volle Inhalt der QuelleKatz, Aron, Mark Johnson, and Jinelle Sperry. Environmental DNA sampling for at-risk and invasive species management on military ranges : guidelines and protocols for installation biologists and land managers. Engineer Research and Development Center (U.S.), 2024. http://dx.doi.org/10.21079/11681/48275.
Der volle Inhalt der QuelleKennedy, Alan, David Moore, and Taylor Rycroft. Field survey to prioritize needs for modernizing dredged material evaluation guidance. Engineer Research and Development Center (U.S.), 2021. http://dx.doi.org/10.21079/11681/40701.
Der volle Inhalt der Quelle