Journal articles on the topic 'Identity access management'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Identity access management.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Pol, Mr Vinay Jayprakash. "Identity and Access Management Tools." International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (2019): 796–98. http://dx.doi.org/10.31142/ijtsrd23935.
Full textUddin, Mumina, and David Preston. "Systematic Review of Identity Access Management in Information Security." Journal of Advances in Computer Networks 3, no. 2 (2015): 150–56. http://dx.doi.org/10.7763/jacn.2015.v3.158.
Full textCarnley, P. Renee, and Houssain Kettani. "Identity and Access Management for the Internet of Things." International Journal of Future Computer and Communication 8, no. 4 (2019): 129–33. http://dx.doi.org/10.18178/ijfcc.2019.8.4.554.
Full textKumar, Vikas, and Aashish Bhardwaj. "Identity Management Systems." International Journal of Strategic Decision Sciences 9, no. 1 (2018): 63–78. http://dx.doi.org/10.4018/ijsds.2018010105.
Full textJin, Qiang, and Deren Kudeki. "Identity and Access Management for Libraries." Technical Services Quarterly 36, no. 1 (2019): 44–60. http://dx.doi.org/10.1080/07317131.2018.1532056.
Full textFuchs, Ludwig, and Günther Pernul. "Qualitätssicherung im Identity- und Access Management." HMD Praxis der Wirtschaftsinformatik 50, no. 1 (2013): 88–97. http://dx.doi.org/10.1007/bf03340780.
Full textPawar, Pratik. "KeyHound - Identity Provider and Access Management." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem30444.
Full textMartin, Luther. "Identity-based Encryption: From Identity and Access Management to Enterprise Privacy Management." Information Systems Security 16, no. 1 (2007): 9–14. http://dx.doi.org/10.1080/10658980601051268.
Full textSaloni Kumari. "Identity and access management: "Elevating security and efficiency: Unveiling the crucial aspects of identity and access management”." International Journal of Engineering & Technology 12, no. 1 (2023): 11–14. http://dx.doi.org/10.14419/ijet.v12i1.32333.
Full textDhamdhere, Mayuri, Shridevi Karande, and Madhura Phatak. "Peer Group Analysis in Identity and Access Management to Identify Anomalies." International Journal of Engineering and Technology 9, no. 3S (2017): 116–21. http://dx.doi.org/10.21817/ijet/2017/v9i3/170903s020.
Full textKunz, Michael, Alexander Puchta, Sebastian Groll, Ludwig Fuchs, and Günther Pernul. "Attribute quality management for dynamic identity and access management." Journal of Information Security and Applications 44 (February 2019): 64–79. http://dx.doi.org/10.1016/j.jisa.2018.11.004.
Full textGoth, G. "Identity management, access specs are rolling along." IEEE Internet Computing 9, no. 1 (2005): 9–11. http://dx.doi.org/10.1109/mic.2005.16.
Full textEverett, Cath. "Identity and Access Management: the second wave." Computer Fraud & Security 2011, no. 5 (2011): 11–13. http://dx.doi.org/10.1016/s1361-3723(11)70051-3.
Full textVarma, Hardik. "Identity Access Management (IAM), Privilege Access Management (PAM) & Security Operation Center (SOC)." International Journal for Research in Applied Science and Engineering Technology 9, no. 11 (2021): 1460–66. http://dx.doi.org/10.22214/ijraset.2021.39029.
Full textCrnic, Josipa. "Access and Identity Management for Libraries: Controlling Access to Online Information." Australian Academic & Research Libraries 46, no. 1 (2015): 64–65. http://dx.doi.org/10.1080/00048623.2014.993451.
Full textMaclean, Lesa. "Access and identity management for libraries: Controlling access to online information." Australian Library Journal 64, no. 1 (2015): 57. http://dx.doi.org/10.1080/00049670.2014.988841.
Full textLodwick, David. "Access and Identity Management for Libraries: Controlling Access to Online Information." Technical Services Quarterly 32, no. 1 (2014): 112–13. http://dx.doi.org/10.1080/07317131.2015.972909.
Full textGunter, Carl, David Liebovitz, and Bradley Malin. "Experience-Based Access Management: A Life-Cycle Framework for Identity and Access Management Systems." IEEE Security & Privacy Magazine 9, no. 5 (2011): 48–55. http://dx.doi.org/10.1109/msp.2011.72.
Full textAhmed, Md Rayhan, A. K. M. Muzahidul Islam, Swakkhar Shatabda, and Salekul Islam. "Blockchain-Based Identity Management System and Self-Sovereign Identity Ecosystem: A Comprehensive Survey." IEEE Access 10 (2022): 113436–81. http://dx.doi.org/10.1109/access.2022.3216643.
Full textChunduru, Anilkumar, and Sumathy S. "Security strategies for cloud identity management - a study." International Journal of Engineering & Technology 7, no. 2 (2018): 732. http://dx.doi.org/10.14419/ijet.v7i2.10410.
Full textAl zoubi, Qusay M., Yousef K. Sanjalawe, and Mohammed Anbar. "An evaluation of identity and access management systems." International Journal of Internet Technology and Secured Transactions 11, no. 1 (2021): 35. http://dx.doi.org/10.1504/ijitst.2021.10035182.
Full textDuggal, Ashmeet Kaur, and Meenu Dave Dr. "INTELLIGENT IDENTITY AND ACCESS MANAGEMENT USING NEURAL NETWORKS." Indian Journal of Computer Science and Engineering 12, no. 1 (2021): 47–56. http://dx.doi.org/10.21817/indjcse/2021/v12i1/211201154.
Full textDevlekar, Sanket, and Vidyavati Ramteke. "Identity and Access Management: High-level Conceptual Framework." Revista Gestão Inovação e Tecnologias 11, no. 4 (2021): 4885–97. http://dx.doi.org/10.47059/revistageintec.v11i4.2511.
Full textSanjalawe, Yousef K., Mohammed Anbar, and Qusay M. Al zoubi. "An evaluation of identity and access management systems." International Journal of Internet Technology and Secured Transactions 11, no. 1 (2021): 35. http://dx.doi.org/10.1504/ijitst.2021.112868.
Full textAdhirai, S., Paramjit Singh, and R. P. Mahapatra. "Identity and access management using Boto and JSON." International Journal of Engineering & Technology 7, no. 2.8 (2018): 640. http://dx.doi.org/10.14419/ijet.v7i2.8.10550.
Full textJalili, Vahid, Enis Afgan, James Taylor, and Jeremy Goecks. "Cloud bursting galaxy: federated identity and access management." Bioinformatics 36, no. 1 (2019): 1–9. http://dx.doi.org/10.1093/bioinformatics/btz472.
Full textS., Devlekar,, and Ramteke, V. "Identity and Access Management: High-level Conceptual Framework." CARDIOMETRY, no. 24 (November 30, 2022): 393–99. http://dx.doi.org/10.18137/cardiometry.2022.24.393399.
Full textKifayat, Kashif, Sameeh Abdulghafour Jassim, and Sufyan T. Faraj. "Management of Identity and Access in the Cloud." Journal of University of Anbar for Pure Science 6, no. 2 (2012): 22–33. http://dx.doi.org/10.37652/juaps.2012.63234.
Full textGodfrey, Duncan. "Layering identity and access management to disrupt attacks." Network Security 2021, no. 11 (2021): 17–19. http://dx.doi.org/10.1016/s1353-4858(21)00133-1.
Full textWang, Shangping, Ru Pei, and Yaling Zhang. "EIDM: A Ethereum-Based Cloud User Identity Management Protocol." IEEE Access 7 (2019): 115281–91. http://dx.doi.org/10.1109/access.2019.2933989.
Full textKylänpää, Markku, and Jarno Salonen. "Combining System Integrity Verification with Identity and Access Management." European Conference on Cyber Warfare and Security 21, no. 1 (2022): 140–49. http://dx.doi.org/10.34190/eccws.21.1.202.
Full textDivyabharathi D. N. and Nagaraj G. Cholli. "A Review on Identity and Access Management Server (KeyCloak)." International Journal of Security and Privacy in Pervasive Computing 12, no. 3 (2020): 46–53. http://dx.doi.org/10.4018/ijsppc.2020070104.
Full textFlieder, Karl. "Identity- und Access-Management mit EAI-Konzepten und -Technologien." Datenschutz und Datensicherheit - DuD 32, no. 8 (2008): 532–36. http://dx.doi.org/10.1007/s11623-008-0126-4.
Full textGruschka, N., L. Lo Iacono, and H. Rajasekaran. "Identity and access management in multi-institutional medical research." e & i Elektrotechnik und Informationstechnik 127, no. 5 (2010): 143–50. http://dx.doi.org/10.1007/s00502-010-0734-1.
Full textPöhn, Daniela, and Wolfgang Hommel. "New Directions and Challenges within Identity and Access Management." IEEE Communications Standards Magazine 7, no. 2 (2023): 84–90. http://dx.doi.org/10.1109/mcomstd.0006.2200077.
Full textMoreno, Rafael Torres, Jesus Garcia-Rodriguez, Jorge Bernal Bernabe, and Antonio Skarmeta. "A Trusted Approach for Decentralised and Privacy-Preserving Identity Management." IEEE Access 9 (2021): 105788–804. http://dx.doi.org/10.1109/access.2021.3099837.
Full textAstorga, Jasone, Marc Barcelo, Aitor Urbieta, and Eduardo Jacob. "How to Survive Identity Management in the Industry 4.0 Era." IEEE Access 9 (2021): 93137–51. http://dx.doi.org/10.1109/access.2021.3092203.
Full textFu, Zom Bo, Jian Xin Wang, Lin Yang, Yuan Cao, and Wei Xing Zhu. "Open Problems for Privacy Preservation in Identity Management." Applied Mechanics and Materials 40-41 (November 2010): 652–56. http://dx.doi.org/10.4028/www.scientific.net/amm.40-41.652.
Full textNuruliansyah, Hendra. "Penerapan Privileged Access Management Menggunakan One Identity Pada Sebuah Perusahaan." INOVA-TIF 2, no. 1 (2020): 12. http://dx.doi.org/10.32832/inova-tif.v1i2.2750.
Full textMonson, Jane. "A Review of “Access and Identity Management for Libraries: Controlling Access to Online Information”." Journal of Electronic Resources Librarianship 26, no. 3 (2014): 228–29. http://dx.doi.org/10.1080/1941126x.2014.939050.
Full textSchorer, Craig. "A Review of “Access and Identity Management for Libraries: Controlling Access to Online Information”." Journal of Access Services 11, no. 4 (2014): 327–28. http://dx.doi.org/10.1080/15367967.2014.945294.
Full textDirgantara, Dhimas, and Is Mardianto. "TEKNIK IDENTITY AND ACCESS MANAGEMENT PADA LAYANAN AMAZON WEB SERVICES." Computatio : Journal of Computer Science and Information Systems 3, no. 1 (2019): 1. http://dx.doi.org/10.24912/computatio.v3i1.4270.
Full textKarim Abdul-Hassan, Alia, and Iman Hasson Hadi. "INTELLIGENT AUTHENTICATION FOR IDENTITY AND ACCESS MANAGEMENT: A REVIEW PAPER." Iraqi Journal for Computers and informatics 45, no. 1 (2019): 6–10. http://dx.doi.org/10.25195/2017/4512.
Full textHadi, Iman. "INTELLIGENT AUTHENTICATION FOR IDENTITY AND ACCESS MANAGEMENT: A REVIEW PAPER." Iraqi Journal for Computers and Informatics 45, no. 1 (2019): 6–10. http://dx.doi.org/10.25195/ijci.v45i1.39.
Full textAguado Corman, Asier, Daniel Fernández Rodríguez, Maria V. Georgiou, et al. "CERN’s Identity and Access Management: A journey to Open Source." EPJ Web of Conferences 245 (2020): 03012. http://dx.doi.org/10.1051/epjconf/202024503012.
Full textSchanzenbach, Martin, and Sebastian Zickau. "Identity and access management in a doping control use case." Datenschutz und Datensicherheit - DuD 41, no. 12 (2017): 724–28. http://dx.doi.org/10.1007/s11623-017-0867-z.
Full textRasouli, Hatef, and Changiz Valmohammadi. "Proposing a conceptual framework for customer identity and access management." Global Knowledge, Memory and Communication 69, no. 1/2 (2019): 94–116. http://dx.doi.org/10.1108/gkmc-02-2019-0014.
Full textIndu, I., P. M. Rubesh Anand, and Vidhyacharan Bhaskar. "Identity and access management in cloud environment: Mechanisms and challenges." Engineering Science and Technology, an International Journal 21, no. 4 (2018): 574–88. http://dx.doi.org/10.1016/j.jestch.2018.05.010.
Full textNikhil Ghadge. "Enhancing threat detection in Identity and Access Management (IAM) systems." International Journal of Science and Research Archive 11, no. 2 (2024): 2050–57. http://dx.doi.org/10.30574/ijsra.2024.11.2.0761.
Full textSingla, Ashish, Nakul Gupta, Prageet Aeron, Anshul Jain, Divya Sharma, and Sangeeta Shah Bharadwaj. "Decentralized Identity Management Using Blockchain." Journal of Global Information Management 31, no. 2 (2022): 1–24. http://dx.doi.org/10.4018/jgim.315283.
Full text