Academic literature on the topic 'Identity access management'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Identity access management.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Identity access management"
Pol, Mr Vinay Jayprakash. "Identity and Access Management Tools." International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (2019): 796–98. http://dx.doi.org/10.31142/ijtsrd23935.
Full textKalwani, Seema. "Identity Access Management, Identity Governance Administration, Privileged Access Management differences, tools and applications." International Journal of Multidisciplinary Research and Growth Evaluation 6, no. 2 (2025): 1832–39. https://doi.org/10.54660/.ijmrge.2025.6.2.1832-1839.
Full textHariharan, Ramanan. "AI-Driven Identity and Access Management in Enterprise Systems." International journal of IoT 05, no. 01 (2025): 62–94. https://doi.org/10.55640/ijiot-05-01-05.
Full textUddin, Mumina, and David Preston. "Systematic Review of Identity Access Management in Information Security." Journal of Advances in Computer Networks 3, no. 2 (2015): 150–56. http://dx.doi.org/10.7763/jacn.2015.v3.158.
Full textCarnley, P. Renee, and Houssain Kettani. "Identity and Access Management for the Internet of Things." International Journal of Future Computer and Communication 8, no. 4 (2019): 129–33. http://dx.doi.org/10.18178/ijfcc.2019.8.4.554.
Full textMr., Vinay Jayprakash Pol. "Identity and Access Management Tools." International Journal of Trend in Scientific Research and Development 3, no. 4 (2019): 796–98. https://doi.org/10.31142/ijtsrd23935.
Full textVenkata, Soma. "Cloud Identity and Access Management." European Journal of Advances in Engineering and Technology 8, no. 7 (2021): 113–17. https://doi.org/10.5281/zenodo.13762453.
Full textKrishnapatnam, Mahendra. "Enhancing Healthcare Security with AI-Driven Identity and Access Management." International Journal of Science and Research (IJSR) 14, no. 2 (2025): 835–38. https://doi.org/10.21275/sr25212205041.
Full textKumar, Vikas, and Aashish Bhardwaj. "Identity Management Systems." International Journal of Strategic Decision Sciences 9, no. 1 (2018): 63–78. http://dx.doi.org/10.4018/ijsds.2018010105.
Full textJin, Qiang, and Deren Kudeki. "Identity and Access Management for Libraries." Technical Services Quarterly 36, no. 1 (2019): 44–60. http://dx.doi.org/10.1080/07317131.2018.1532056.
Full textDissertations / Theses on the topic "Identity access management"
Fryaufová, Lucie. "Řízení identit v organizacích." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-162629.
Full textJaferian, Pooya. "User-centered design of identity and access management systems." Thesis, University of British Columbia, 2014. http://hdl.handle.net/2429/51243.
Full textKotora, Ondřej. "Centralizovaná správa rolí." Master's thesis, Vysoká škola ekonomická v Praze, 2008. http://www.nusl.cz/ntk/nusl-3371.
Full textRhermini, Siham. "Identity, Access Management and Single Sign-On Web-based Solutions." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-92235.
Full textHummer, Matthias [Verfasser], Günther [Akademischer Betreuer] Pernul, and Dogan [Akademischer Betreuer] Kesdogan. "Sustainable Identity and Access Management / Matthias Hummer ; Günther Pernul, Dogan Kesdogan." Regensburg : Universitätsbibliothek Regensburg, 2019. http://d-nb.info/1189905426/34.
Full textHummer, Matthias Verfasser], Günther [Akademischer Betreuer] [Pernul, and Dogan [Akademischer Betreuer] Kesdogan. "Sustainable Identity and Access Management / Matthias Hummer ; Günther Pernul, Dogan Kesdogan." Regensburg : Universitätsbibliothek Regensburg, 2019. http://nbn-resolving.de/urn:nbn:de:bvb:355-epub-403116.
Full textDeas, Matthew Burns. "Towards a user centric model for identity and access management within the online environment." Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/775.
Full textFilipsson, Emma. "Modelling and simulating Identity and Access Management based lateral movement in a cloud infrastructure." Thesis, KTH, Fysik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-252836.
Full textEngström, Pontus. "Exploring the non-technical challenges : A case study of identity and access management projects." Thesis, KTH, Skolan för industriell teknik och management (ITM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-256228.
Full textCallahan, Michael John. "Exploring Identity Management at Community Colleges in Texas with Open Access to College Computer Networks." ScholarWorks, 2011. https://scholarworks.waldenu.edu/dissertations/1641.
Full textBooks on the topic "Identity access management"
Rawal, Bharat S., Gunasekaran Manogaran, and Alexender Peter. Cybersecurity and Identity Access Management. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-2658-7.
Full textRamey, Kenneth. Pro Oracle Identity and Access Management Suite. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1521-0.
Full textTodorov, Dobromir. Mechanics of user identificatlion and authentication: Fundamentals of identity management. Auerbach Pub, 2007.
Find full textOrondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Information Science Reference, 2010.
Find full textOrondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Information Science Reference, 2010.
Find full textOrondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Information Science Reference, 2010.
Find full textOrondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Information Science Reference, 2010.
Find full textPohlman, Marlin B. Oracle identity management: Governance, risk, and compliance architecture. 3rd ed. Auerbach Publications, 2008.
Find full textGroup, Butler, ed. Identity and access management: Building a security framework using single sign-on and authentication technology. Butler Direct Limited, 2003.
Find full textBook chapters on the topic "Identity access management"
D’Oliveiro, Michael. "Identity access management." In The Streaming Media Guide. Routledge, 2019. http://dx.doi.org/10.4324/9780429429750-7.
Full textHaber, Morey J., and Darran Rolls. "Privileged Access Management." In Identity Attack Vectors. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5165-2_13.
Full textHaber, Morey J., and Darran Rolls. "Privileged Access Management (PAM)." In Identity Attack Vectors. Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0233-1_8.
Full textSturrus, Edwin, and Olga Kulikova. "Identity and Access Management." In Encyclopedia of Cloud Computing. John Wiley & Sons, Ltd, 2016. http://dx.doi.org/10.1002/9781118821930.ch33.
Full textPng, Adrian, and Luc Demanche. "Identity and Access Management." In Getting Started with Oracle Cloud Free Tier. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6011-1_2.
Full textDanturthi, R. Sarma. "Identity and Access Management." In 70 Tips and Tricks for Mastering the CISSP Exam. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6225-2_5.
Full textRobichau, Bernard Peter. "Identity and Access Management." In Healthcare Information Privacy and Security. Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6677-8_7.
Full textBeach, Brian. "Identity and Access Management." In Pro Powershell for Amazon Web Services. Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6452-1_11.
Full textBeach, Brian, Steven Armentrout, Rodney Bozo, and Emmanuel Tsouris. "Identity and Access Management." In Pro PowerShell for Amazon Web Services. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4850-8_9.
Full textOts, Karl. "Identity and Access Management." In Azure Security Handbook. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7292-3_2.
Full textConference papers on the topic "Identity access management"
Singh, Abhishek Pratap, Ievgeniia Kuzminykh, and Bogdan Ghita. "Industry Perception of Security Challenges with Identity Access Management Solutions." In 2024 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom). IEEE, 2024. http://dx.doi.org/10.1109/blackseacom61746.2024.10646296.
Full textVoicu, Vladimir, Dorin Petreuş, Emil Cebuc, and Silviu Băjenaru Marcu. "University Identity and Access Management Infrastructure with Keycloak: Lessons Learned." In 2024 23rd RoEduNet Conference: Networking in Education and Research (RoEduNet). IEEE, 2024. http://dx.doi.org/10.1109/roedunet64292.2024.10722517.
Full textNosouhi, Mohammad Reza, Zubair Baig, Robin Doss, et al. "The Value of Strong Identity and Access Management for ICS/OT Security." In 2024 21st Annual International Conference on Privacy, Security and Trust (PST). IEEE, 2024. https://doi.org/10.1109/pst62714.2024.10788047.
Full textLakshmi, J. Maha, Krishna Prasad, P. Samson Anosh Babu, and Ravikumar Ch. "A Decentralized Approach for Enhancing Identity and Access Management through Blockchain Integration." In 2024 IEEE 6th International Conference on Cybernetics, Cognition and Machine Learning Applications (ICCCMLA). IEEE, 2024. https://doi.org/10.1109/icccmla63077.2024.10871512.
Full textCuzzocrea, Alfredo, and Islam Belmerabet. "Privacy-Preserving Identity and Access Management in Multiple Cloud Environments: Models, Issues, and Solutions." In 2024 IEEE International Conference on Big Data (BigData). IEEE, 2024. https://doi.org/10.1109/bigdata62323.2024.10826004.
Full textAttaluri, Vivek Chowdary, Muniraju Hullurappa, Ravikumar Batchu, Lakshmi Narasimha Raju Mudunuri, Gopichand Vemulapalli, and Naga Ramesh Palakurti. "Identity Access Management for Network Devices: Enhancing Security of Modern IT Infrastructure in Healthcare." In 2025 International Conference on Data Science and Business Systems (ICDSBS). IEEE, 2025. https://doi.org/10.1109/icdsbs63635.2025.11032042.
Full textTsoodol, Lkhamrolom, Munkhnasan Tuvdendorj, Javkhlan Rentsendorj, and Oyun-Erdene Namsrai. "Implementing Unified Identity and Access Management System: Case Study for the National University of Mongolia." In 2024 IEEE 9th International Conference on Data Science in Cyberspace (DSC). IEEE, 2024. https://doi.org/10.1109/dsc63484.2024.00124.
Full textMorris, Vinton, and Kevin Kornegay. "Flow Table Modification Using Behavioral-Based Fingerprinting Technique to Facilitate Zero Trust Identity Management and Access Control." In 2025 IEEE 15th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 2025. https://doi.org/10.1109/ccwc62904.2025.10903861.
Full textDemirsoy, H. Burak, Ezgi Nur Kose, Furkan Aydogan, Muhammed H. Ezgin, and M. Ali Akcayol. "Hybrid Deep Learning Model Based Advanced AI-Driven Identity and Access Management System for Enhanced Security and Efficiency." In 2024 8th International Symposium on Innovative Approaches in Smart Technologies (ISAS). IEEE, 2024. https://doi.org/10.1109/isas64331.2024.10845215.
Full textWeiYi Liu, Yue Tan, and Enwei Zhang. "Service token for identity access management." In 2009 IEEE Asia-Pacific Services Computing Conference (APSCC). IEEE, 2009. http://dx.doi.org/10.1109/apscc.2009.5394143.
Full textReports on the topic "Identity access management"
McCarthy, Jim, Don Faatz, Harry Perper, Chris Peloquin, John Wiltberger, and Leah Kauffman. Identity and access management for electric utilities. National Institute of Standards and Technology, 2018. http://dx.doi.org/10.6028/nist.sp.1800-2.
Full textHarbitz, Mia Elisabeth. The Civil Registry: A Neglected Dimension of International Development. Inter-American Development Bank, 2013. http://dx.doi.org/10.18235/0009117.
Full textKetterer, Juan Antonio, and Agustina Calatayud. Integrated Value Chain Risk Management. Inter-American Development Bank, 2016. http://dx.doi.org/10.18235/0010631.
Full textBaena Olabe, Paloma, and Juan Cruz Vieyra. Access to Information and Targeted Transparency Policies. Inter-American Development Bank, 2011. http://dx.doi.org/10.18235/0009022.
Full textGwin, Catherine, Mayra Ruiz, Saleema Vellani, and Alejandro Guerrero. IDB-9: Access to Information. Inter-American Development Bank, 2013. http://dx.doi.org/10.18235/0010517.
Full textShaheen, Susan, Elliot Shaheen, Adam Cohen, Jacquelyn Broader, and Richard Davis. Managing the Curb: Understanding the Impacts of On-Demand Mobility on Public Transit, Micromobility, and Pedestrians. Mineta Transportation Institute, 2022. http://dx.doi.org/10.31979/mti.2022.1904.
Full textMaletta, Giovanna, and Mike Lewis. Post-shipment On-site Inspections and Stockpile Management Assistance: Bridging Gaps. Stockholm International Peace Research Institute, 2022. http://dx.doi.org/10.55163/ulfp1679.
Full textButcher, Neil, and Alison Zimmermann. Opportunities and Challenges for EMIS Implementation in the Caribbean. Inter-American Development Bank, 2023. http://dx.doi.org/10.18235/0005071.
Full textKatz, Aron, Mark Johnson, and Jinelle Sperry. Environmental DNA sampling for at-risk and invasive species management on military ranges : guidelines and protocols for installation biologists and land managers. Engineer Research and Development Center (U.S.), 2024. http://dx.doi.org/10.21079/11681/48275.
Full textKennedy, Alan, David Moore, and Taylor Rycroft. Field survey to prioritize needs for modernizing dredged material evaluation guidance. Engineer Research and Development Center (U.S.), 2021. http://dx.doi.org/10.21079/11681/40701.
Full text