Academic literature on the topic 'Identity management systems'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Identity management systems.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Identity management systems"
Kumar, Vikas, and Aashish Bhardwaj. "Identity Management Systems." International Journal of Strategic Decision Sciences 9, no. 1 (2018): 63–78. http://dx.doi.org/10.4018/ijsds.2018010105.
Full textTracy, Kim. "Identity management systems." IEEE Potentials 27, no. 6 (2008): 34–37. http://dx.doi.org/10.1109/mpot.2008.929295.
Full textBackhouse, James. "Interoperability of identity and identity management systems." Datenschutz und Datensicherheit - DuD 30, no. 9 (2006): 568–70. http://dx.doi.org/10.1007/s11623-006-0145-y.
Full textWayman, James L. "Biometrics in Identity Management Systems." IEEE Security & Privacy Magazine 6, no. 2 (2008): 30–37. http://dx.doi.org/10.1109/msp.2008.28.
Full textHariharan, Ramanan. "AI-Driven Identity and Access Management in Enterprise Systems." International journal of IoT 05, no. 01 (2025): 62–94. https://doi.org/10.55640/ijiot-05-01-05.
Full textAl Khouri, Ali M. "PKI in Government Identity Management Systems." International Journal of Network Security & Its Applications 3, no. 3 (2011): 69–96. http://dx.doi.org/10.5121/ijnsa.2011.3306.
Full textMaha, Aldosary, and Alqahtani Norah. "A SURVEY ON FEDERATED IDENTITY MANAGEMENT SYSTEMS LIMITATION AND SOLUTIONS." International Journal of Network Security & Its Applications (IJNSA) 13, no. 3 (2021): 43–59. https://doi.org/10.5281/zenodo.4978701.
Full textYadav, Susheel. "Decentralizing Identity with Blockchain Technology in Digital Identity Management." Journal of Current Research in Blockchain 1, no. 3 (2024): 178–89. https://doi.org/10.47738/jcrb.v1i3.22.
Full textPacyna, Piotr, Anthony Rutkowski, Amardeo Sarma, and Kenji Takahashi. "Trusted Identity for All: Toward Interoperable Trusted Identity Management Systems." Computer 42, no. 5 (2009): 30–32. http://dx.doi.org/10.1109/mc.2009.168.
Full textLiu, Yang, Debiao He, Mohammad S. Obaidat, Neeraj Kumar, Muhammad Khurram Khan, and Kim-Kwang Raymond Choo. "Blockchain-based identity management systems: A review." Journal of Network and Computer Applications 166 (September 2020): 102731. http://dx.doi.org/10.1016/j.jnca.2020.102731.
Full textDissertations / Theses on the topic "Identity management systems"
Al-sinani, Haitham. "Managing identity management systems." Thesis, Royal Holloway, University of London, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.588513.
Full textFerdous, Md Sadek. "Identity Management with Petname Systems." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9031.
Full textNizamani, Hyder Ali. "Modelling architectures of federated identity management systems." Thesis, University of Leicester, 2012. http://hdl.handle.net/2381/10180.
Full textAlrodhan, Waleed A. "Privacy and practicality of identity management systems." Thesis, Royal Holloway, University of London, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.531291.
Full textFerdous, Md Sadek. "User-controlled Identity Management Systems using mobile devices." Thesis, University of Glasgow, 2015. http://theses.gla.ac.uk/6621/.
Full textGestin, Mathieu. "Privacy-preserving and fully distributed identity management systems." Electronic Thesis or Diss., Université de Rennes (2023-....), 2024. http://www.theses.fr/2024URENS065.
Full textGustab, Tomáš. "Řízení identit v bance." Master's thesis, Vysoká škola ekonomická v Praze, 2015. http://www.nusl.cz/ntk/nusl-201662.
Full textSong, Theo Sagita. "Identity Verification and Conflict in Distributed Teams." Diss., The University of Arizona, 2007. http://hdl.handle.net/10150/194805.
Full textJaferian, Pooya. "User-centered design of identity and access management systems." Thesis, University of British Columbia, 2014. http://hdl.handle.net/2429/51243.
Full textPengiran, Salleh Ab Rahaman P. A. "A human-centred approach to national identity management systems." Thesis, University College London (University of London), 2012. http://discovery.ucl.ac.uk/1370642/.
Full textBooks on the topic "Identity management systems"
author, Takahashi Kenji, ed. Identity management: Concepts, technologies, and systems. Artech House, 2011.
Find full textGrady, Jeffrey O. System management: Planning, enterprise identity, and deployment. 2nd ed. Taylor & Francis, 2010.
Find full textCamenisch, Jan. Privacy and Identity Management for Life. Springer-Verlag Berlin Heidelberg, 2011.
Find full textRoyer, Denis. Enterprise Identity Management: Towards an Investment Decision Support Approach. Springer Berlin Heidelberg, 2013.
Find full textInternational Business Machines Corporation. International Technical Support Organization, ed. z/OS identity propagation. IBM, International Technical Support Organization, 2011.
Find full textCamenisch, Jan. Digital Privacy: PRIME - Privacy and Identity Management for Europe. Springer Berlin Heidelberg, 2011.
Find full textWilliam, Dutcher, Khan Jamil, and National Institute of Standards and Technology (U.S.), eds. An ontology of identity credentials. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2006.
Find full textFischer-Hübner, Simone. Policies and Research in Identity Management: Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013. Proceedings. Springer Berlin Heidelberg, 2013.
Find full textG, Straus Susan, ed. Patient privacy, consent, and identity management in health information exchange: Issues for the military health system. RAND, 2013.
Find full textPenny, Duquenoy, Hansen Marit, Leenes Ronald, Zhang Ge, and SpringerLink (Online service), eds. Privacy and Identity Management for Life: 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers. IFIP International Federation for Information Processing, 2011.
Find full textBook chapters on the topic "Identity management systems"
Ashbourn, Julian. "Identity Management." In Guide to Biometrics for Large-Scale Systems. Springer London, 2011. http://dx.doi.org/10.1007/978-0-85729-467-8_4.
Full textGlässer, Uwe, and Mona Vajihollahi. "Identity Management Architecture." In Annals of Information Systems. Springer US, 2009. http://dx.doi.org/10.1007/978-1-4419-1325-8_6.
Full textBerbar, A., and A. Belkhir. "Blockchain-Based Identity Management." In Lecture Notes in Networks and Systems. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-60629-8_8.
Full textDólera Tormo, Ginés, Félix Gómez Mármol, and Gregorio Martínez Pérez. "Identity Management in Cloud Systems." In Security, Privacy and Trust in Cloud Systems. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38586-5_6.
Full textRoyer, Denis. "A Decision Support Model for the Introduction of EIdM Systems." In Enterprise Identity Management. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-35040-5_5.
Full textSatybaldy, Abylay, Mariusz Nowostawski, and Jørgen Ellingsen. "Self-Sovereign Identity Systems." In Privacy and Identity Management. Data for Better Living: AI and Privacy. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42504-3_28.
Full textBackhouse, James, and Ruth Halperin. "Approaching Interoperability for Identity Management Systems." In The Future of Identity in the Information Society. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01820-6_6.
Full textPrakken, Bart. "The Identity of Management Information Systems." In Information, Organization and Information Systems Design. Springer US, 2000. http://dx.doi.org/10.1007/978-1-4615-4421-0_3.
Full textManders-Huits, Noëmi, and Jeroen Hoven. "Moral identification in Identity Management Systems." In The Future of Identity in the Information Society. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-79026-8_6.
Full textPreuveneers, Davy. "Identity Management for Cyber-Physical Systems." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-642-27739-9_1727-2.
Full textConference papers on the topic "Identity management systems"
M, Ponni Valavan, Shahazad Niwazi Qurashi, Farrukh Sobia, Faraj Harahsheh, Suseendran Surendran, and S. Suma Christal Mary. "Decentralized Identity Management Using Blockchain for Healthcare Systems." In 2024 IEEE Silchar Subsection Conference (SILCON). IEEE, 2024. https://doi.org/10.1109/silcon63976.2024.10910771.
Full textTabbassum, Ayisha, Pradeep Chintale, Charankumar Akiri, and Nishit Bhasin. "Leveraging Block chain for Secure and Decentralized Identity Management." In 2024 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS). IEEE, 2024. https://doi.org/10.1109/icbds61829.2024.10837296.
Full textPöhn, Daniela, and Heiner Lüken. "Got Ya!: Sensors for Identity Management Specific Security Situational Awareness." In 11th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2025. https://doi.org/10.5220/0013092900003899.
Full textGhosh, Ananya, Sarthak Salokhe, Rigved Mankame, and Vaishali Kumar. "Blockchain Based Identity Management and Verification System for Educational Institutions." In 2024 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS). IEEE, 2024. https://doi.org/10.1109/icbds61829.2024.10837049.
Full textHong, Jianan, Jiayue Zhou, Yuqing Li, Jia Cheng, and Cunqing Hua. "AcBF: A Revocable Blockchain-Based Identity Management Enabling Low-Latency Authentication." In 2024 IEEE 44th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2024. http://dx.doi.org/10.1109/icdcs60910.2024.00037.
Full textChehab, Maya I., and Ali E. Abdallah. "Assurance in identity management systems." In 2010 Sixth International Conference on Information Assurance and Security (IAS). IEEE, 2010. http://dx.doi.org/10.1109/isias.2010.5604073.
Full textArabo, Abdullahi, Mike Kennedy, Qi Shi, Madjid Merabti, David Llewellyn-Jones, and Kashif Kifayat. "Identity management in System-of-Systems Crisis Management situation." In 2011 6th International Conference on System of Systems Engineering (SoSE). IEEE, 2011. http://dx.doi.org/10.1109/sysose.2011.5966570.
Full textL'Amrani, Hasnae, Badr Eddine Berroukech, Younes El Bouzekri El Idrissi, and Rachida Ajhoun. "Identity management systems: Laws of identity for models7 evaluation." In 2016 4th IEEE International Colloquium on Information Science and Technology (CIST). IEEE, 2016. http://dx.doi.org/10.1109/cist.2016.7804984.
Full textDabrowski, Marcin, and Piotr Pacyna. "Blockchain-based identity dicovery between heterogenous identity management systems." In 2022 6th International Conference on Cryptography, Security and Privacy (CSP). IEEE, 2022. http://dx.doi.org/10.1109/csp55486.2022.00032.
Full textFongen, Anders. "Identity Management without Revocation." In 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE). IEEE, 2010. http://dx.doi.org/10.1109/securware.2010.20.
Full textReports on the topic "Identity management systems"
Lesavre, Loïc. A Taxonomic Approach to Understanding Emerging Blockchain Identity Management Systems. National Institute of Standards and Technology, 2020. http://dx.doi.org/10.6028/nist.cswp.01142020.
Full textLesavre, Loïc. A Taxonomic Approach to Understanding Emerging Blockchain Identity Management Systems. National Institute of Standards and Technology, 2020. http://dx.doi.org/10.6028/nist.cswp.9.
Full textSantoro, Fabrizio, Celeste Scarpini, and Stephen Okiya. The Potential of Digital ID Systems for Tax Administration: the Case of Ghana. Institute of Development Studies, 2025. https://doi.org/10.19088/ictd.2025.011.
Full textGrizzle, K., M. Ansari, E. Wahlstroem, and C. Mortimore. System for Cross-domain Identity Management: Protocol. Edited by P. Hunt. RFC Editor, 2015. http://dx.doi.org/10.17487/rfc7644.
Full textGrizzle, K., E. Wahlstroem, and C. Mortimore. System for Cross-domain Identity Management: Core Schema. Edited by P. Hunt. RFC Editor, 2015. http://dx.doi.org/10.17487/rfc7643.
Full textHunt, P., B. Khasnabish, A. Nadalin, and Z. Zeltsan. System for Cross-domain Identity Management: Definitions, Overview, Concepts, and Requirements. Edited by K. LI. RFC Editor, 2015. http://dx.doi.org/10.17487/rfc7642.
Full textEmes, Michael, and William Griffiths. Systems thinking: How is it used in project management? Association for Project Management, 2018. http://dx.doi.org/10.61175/gjmz4716.
Full textBell, Matthew, and David Kack. Setting up ROaDS Partners with Customized Surveys: Final Report. Western Transportation Institute, 2024. http://dx.doi.org/10.15788/1727735231.
Full textWillson, Stephanie, and Kristen Miller. Cognitive interview Evaluation of Demographic Questions for the US Department of State Global Employee Management System. National Center for Health Statistics (U.S.), 2023. http://dx.doi.org/10.15620/cdc/150786.
Full textPiercy, Candice, Brandon Boyd, Emily Russ, and Kyle Runion. Systematic beneficial use of dredged sediments : matching sediment needs with dredging requirements. Engineer Research and Development Center (U.S.), 2022. http://dx.doi.org/10.21079/11681/45443.
Full text