Academic literature on the topic 'Identity management systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Identity management systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Identity management systems"

1

Kumar, Vikas, and Aashish Bhardwaj. "Identity Management Systems." International Journal of Strategic Decision Sciences 9, no. 1 (2018): 63–78. http://dx.doi.org/10.4018/ijsds.2018010105.

Full text
Abstract:
This article describes how in today's digital world, customers have made it a common practice to maintain user accounts with different service providers to access a range of services. In such environment, all attributes of the identity must be verified to operate, otherwise the resources would be vulnerable to financial and data loss. This article contends that makes it important to form an Identity Management System, which could provide central administration, user self- service, role based access control and integrated user management. Identity Management becomes very much vital for the environment working with multiple technologies, as it governs an entity (i.e. a human or a software agent) to authenticate and authorize for accessing the network via multiple technologies. Successful Identity Management increases the efficiency, security, access control and decreases the complexity, cost and many repetitive works. Essential features of present day identity management systems have been identified in the present work. A comparative analysis of these identity management systems has been carried out to establish the present-day industry practices. Along with that, specific challenges to the present-day identity management systems have been identified. The article helps in the identification of suitable Identity Management System for specific applications.
APA, Harvard, Vancouver, ISO, and other styles
2

Tracy, Kim. "Identity management systems." IEEE Potentials 27, no. 6 (2008): 34–37. http://dx.doi.org/10.1109/mpot.2008.929295.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Backhouse, James. "Interoperability of identity and identity management systems." Datenschutz und Datensicherheit - DuD 30, no. 9 (2006): 568–70. http://dx.doi.org/10.1007/s11623-006-0145-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wayman, James L. "Biometrics in Identity Management Systems." IEEE Security & Privacy Magazine 6, no. 2 (2008): 30–37. http://dx.doi.org/10.1109/msp.2008.28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hariharan, Ramanan. "AI-Driven Identity and Access Management in Enterprise Systems." International journal of IoT 05, no. 01 (2025): 62–94. https://doi.org/10.55640/ijiot-05-01-05.

Full text
Abstract:
Identity and Access Management (IAM) is essential for cybersecurity architecture because of the increasing complexity of the digital enterprise. The research investigates how Artificial Intelligence (AI) transforms Identity and Access Management (IAM) by establishing context-aware systems that function adaptively through automated identity governance capabilities. Concepts from traditional IAM infrastructure face challenges when implementing dynamic access models because they base their function on manual processes and static policies in their design. Machine learning combined with behavioral analytics and orchestration capabilities installed across the entire IAM lifecycle by AI can solve these issues, from authentication procedures to authorization functions and continuing through entitlement governance until policy execution. AI integration establishes continuous authentication with behavioral biometrics and conducts real-time anomaly detection through unsupervised learning models to enable proactive threat mitigation through risk-adaptive access controls. Through AI, the discovery and automation of access rights become possible because systems use actual user activities and organizational settings to refine and certify proper access definitions. The automation systems help organizations comply with GDPR and HIPAA by delivering immediate policy changes while providing auditable access decision logs. The research document evaluates how AI contributes to creating IAM infrastructure that can adapt because it uses predictive load-balancing techniques, self-healing orchestration mechanisms, and autonomous incident response capabilities. The document shows how IAM unites with Security Operations Centers (SOCs) by correlating identity signals with wider security monitoring data to enhance security detection visibility and coordinated response. This report reveals through technical precision and industry examples that AI-driven IAM functions as a security defense system and a business-enabling power for operational speed, compliance adherence, and digital safety in organizational networks. The research highlights AI's critical position in creating security for contemporary identity perimeters.
APA, Harvard, Vancouver, ISO, and other styles
6

Al Khouri, Ali M. "PKI in Government Identity Management Systems." International Journal of Network Security & Its Applications 3, no. 3 (2011): 69–96. http://dx.doi.org/10.5121/ijnsa.2011.3306.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Maha, Aldosary, and Alqahtani Norah. "A SURVEY ON FEDERATED IDENTITY MANAGEMENT SYSTEMS LIMITATION AND SOLUTIONS." International Journal of Network Security & Its Applications (IJNSA) 13, no. 3 (2021): 43–59. https://doi.org/10.5281/zenodo.4978701.

Full text
Abstract:
An efficient identity management system has become one of the fundamental requirements for ensuring safe, secure, and transparent use of identifiable information and attributes. Federated Identity Management (FIdM) allows users to distribute their identity information across security domains which increases the portability of their digital identities, and it is considered a promising approach to facilitate secure resource sharing among collaborating participants in heterogeneous IT environments. However, it also raises new architectural challenges and significant security and privacy issues that need to be mitigated. In this paper, we provide a comparison between FIdM architectures, presented the limitations and risks in FIdM system, and discuss the results and proposed solutions.
APA, Harvard, Vancouver, ISO, and other styles
8

Yadav, Susheel. "Decentralizing Identity with Blockchain Technology in Digital Identity Management." Journal of Current Research in Blockchain 1, no. 3 (2024): 178–89. https://doi.org/10.47738/jcrb.v1i3.22.

Full text
Abstract:
Blockchain technology has emerged as a promising solution for digital identity verification, offering significant improvements in security, decentralization, and privacy. This study examines the application of blockchain in identity systems, focusing on the benefits and challenges it presents. The findings reveal that blockchain enhances security by 85%, decentralizes data control by 80%, and improves privacy protection by 75% compared to traditional centralized systems. Additionally, the study highlights key challenges, including regulatory uncertainty, scalability issues, and interoperability concerns. Regulatory gaps remain a major obstacle to widespread adoption, despite a rapid increase in blockchain adoption rates from 5% in 2016 to 75% in 2022. Scalability also poses significant technical challenges, with public blockchains struggling to handle large transaction volumes efficiently. Through a comparative analysis, the study shows that blockchain-based identity systems outperform traditional centralized systems in terms of data control (90% vs. 40%), security (85% vs. 50%), and transparency (95% vs. 30%). However, traditional systems still lead in scalability by 10%. This paper concludes that while blockchain holds the potential to revolutionize identity verification, addressing regulatory, scalability, and interoperability issues is critical to achieving its full potential. Future research should focus on developing more scalable consensus mechanisms and standardized frameworks to promote adoption, ensuring blockchain’s viabilityas a global identity management solution.
APA, Harvard, Vancouver, ISO, and other styles
9

Pacyna, Piotr, Anthony Rutkowski, Amardeo Sarma, and Kenji Takahashi. "Trusted Identity for All: Toward Interoperable Trusted Identity Management Systems." Computer 42, no. 5 (2009): 30–32. http://dx.doi.org/10.1109/mc.2009.168.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Liu, Yang, Debiao He, Mohammad S. Obaidat, Neeraj Kumar, Muhammad Khurram Khan, and Kim-Kwang Raymond Choo. "Blockchain-based identity management systems: A review." Journal of Network and Computer Applications 166 (September 2020): 102731. http://dx.doi.org/10.1016/j.jnca.2020.102731.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Identity management systems"

1

Al-sinani, Haitham. "Managing identity management systems." Thesis, Royal Holloway, University of London, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.588513.

Full text
Abstract:
Although many identity management systems have been proposed, in- tended to improve the security and usability of user authentication, major adoption problems remain. In this thesis we propose a range of novel schemes to address issues acting as barriers to adoption, namely the lack of interoper- ation between systems, simple adoption strategies, and user security within such systems. To enable interoperation, a client-based model is proposed supporting in- terworking between identity management systems. Information Card systems (e.g. CardSpace) are enhanced to enable a user to obtain a security token from an identity provider not supporting Information Cards; such a token, after en- capsulation at the client, can be processed by an Information Card-enabled relying party. The approach involves supporting interoperation at the client, while maximising transparency to identity providers, relying parties and iden- tity selectors. Four specific schemes conforming to the model are described, each of which has been prototyped. These schemes enable interoperation be- tween an Information Card-enabled relying party and an identity provider supporting one of Liberty, Shibboleth, OpenID, or OAuth. To facilitate adoption, novel schemes are proposed that enable Informa- tion Card systems to support password management and single sign on. The schemes do not require any changes to websites, and provide a simple, intu- itive user experience through use of the identity selector interface. They fa- miliarise users with Information Card systems, thereby potentially facilitating their future adoption. To improve user security, an enhancement to Information Card system user authentication is proposed. During user authentication, a one-time pass- word is sent to the user's mobile device which is then entered into the com- puter by the user. Finally, a universal identity management tool is proposed, designed to support a wide range of systems using a single user interface. It provides a consistent user experience, addresses a range of security issues (e.g. phishing), and provides greater user control during authentication.
APA, Harvard, Vancouver, ISO, and other styles
2

Ferdous, Md Sadek. "Identity Management with Petname Systems." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9031.

Full text
Abstract:
<p>In the first part of the thesis, we have focused on providing a brief overview of Petname Systems starting from the introductory concept of Entity, Identity and Identity Management with a brief description on different IdM architectures. We have found that the Petname Model is well suited to be integrated in the Personal SP Identity model. We also provided a brief description on Identity Theft and the Phishing attack with different attack techniques and defense mechanisms. Then we summarized the history and evolution of the Petname Model in one place. Previously it was scattered among several web articles. We have formally defined the properties of Petname Systems and explained how this set of properties can satisfy the essential security usability principles. It is our belief that if these properties are followed in developing applications based on the Petname Model, it will improve the user experience and improve overall security by removing security vulnerabilities related to poor usability. The thesis has also analyzed two available Petname-based applications for server identification management and shown that they represent an improvement in usability, but unfortunately do not satisfy all the specified Security Usability principles. In the second part, we have developed the UniPet, a Petname Model based application with similar functionalities of the Petname Tool and the TrustBar, that utilizes the concept of aiding user in identifying SP identities securely on their side. We have deployed several technologies to meet the complex level of interaction the UniPet asks for. We have provided a brief discussion on each of the technologies to better understand the UniPet architecture. We have also shown that the UniPet has been a major improvement on GUI and on the security usability issues over those two applications. The UniPet satisfies all the properties of a Petname System and thus is fully compliant with the Security Usability principles. We believe that the UniPet will provide the users with an improved and secure browsing experience.</p>
APA, Harvard, Vancouver, ISO, and other styles
3

Nizamani, Hyder Ali. "Modelling architectures of federated identity management systems." Thesis, University of Leicester, 2012. http://hdl.handle.net/2381/10180.

Full text
Abstract:
Today’s dynamic and scalable collaborative systems demand not only to deal with functional but also some non-functional (e.g., security) requirements. For a secure inter-organisational collaboration scenario, Federated Identity Management systems (FIMs) provide a suitable mechanism to deal with access control. FIMs enable users of an organisation to access resources (or services) of the other trusted organisations in a secure and seamless way. More precisely, FIMs allow cross-domain user authentication to enable access control across organisations under the concept known as Circle of Trust (CoT). Patterns of FIMs emerged as recurring CoT scenarios due to the fact that each of these patterns has different security requirements. More importantly, organisations may join up or leave the CoT during the development life-cycle. Such a change in a FIM system may have an impact on its security requirements. Therefore, it is important to formally describe architectural and reconfiguration aspects of FIMs by considering their patterns. To this purpose, we propose • two UML models for FIMs where one model uses the standard UML notations to describe architectural aspects of FIMs while the other uses the UML profile in [33] to describe those aspects of FIMs together with their reconfigurations • a formal model for FIMs in ADR (Architectural Design Rewriting) to characterise their patterns by describing an architectural style together with style-preserving reconfigurations. We also study the adequacy of UML to describe architectural aspects of systems and compare it with ADR. Our comparison develops through the modelling of architectural and reconfiguration aspects of FIMs. In ADR, these aspects of FIMs are suitably represented through style-consistent (graphical) designs in terms of ADR productions. On the other hand, UML has limitations in expressing constraints over complex associations; also, UML seems to provide unsatisfactory support for presenting architectural styles in a general way. Overall, our investigation shows that UML has some drawbacks due to the complexity of diagrams, their proliferation, and the lack of a precise semantics that consistently relates them. ADR gives precise and simpler specifications for architectural design.
APA, Harvard, Vancouver, ISO, and other styles
4

Alrodhan, Waleed A. "Privacy and practicality of identity management systems." Thesis, Royal Holloway, University of London, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.531291.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ferdous, Md Sadek. "User-controlled Identity Management Systems using mobile devices." Thesis, University of Glasgow, 2015. http://theses.gla.ac.uk/6621/.

Full text
Abstract:
Thousands of websites providing an array of diversified online services have been the crucial factor for popularising the Internet around the world during last 15 years. The current model of accessing the majority of those services requires users to register with a Service Provider - an administrative body that offers and provides online services. The registration procedure involves users providing a number of pieces of data about themselves which are then stored at the provider. This data provides a digital image of the user and is commonly known as the Identity of the user in that provider. To access different online services, users register at different providers and ultimately end up with a number of scattered identities which become increasingly difficult to manage. It is one of the major problems of the current setting of online services. What is even worse is that users have less control over the data stored in these providers and have no knowledge how their data is treated by providers. The concept of Identity Management has been introduced to help users facilitate the management of their identities in a user-friendly, secure and privacy-friendly way and thus, to tackle the stated problems. There exists a number of Identity Management models and systems, unfortunately, none of them has played a pivotal role in tackling the problems effectively and comprehensively. Simultaneously, we have experienced another trend expanding at a remarkable rate: the consumption and the usage of smart mobile devices. These mobile devices are not only growing in numbers but also in capability and capacity in terms of processing power and memory. Most are equipped with powerful hardware and highly-dynamic mobile operating systems offering touch-sensitive intuitive user-interfaces. In many ways, these mobile devices have become an integrated part of our day-to-day life and accompany us everywhere we go. The capability, portability and ubiquitous presence of such mobile devices lead to the core objective of this research: the investigation of how such mobile devices can be used to overcome the limitations of the current Identity Management Systems as well as to provide innovative online services. In short, this research investigates the need for a novel Identity Management System and the role the current generation of smart mobile devices can play in realising such a system. In this research it has been found that there exist different inconsistent notions of many central topics in Identity Management which are mostly defined in textual forms. To tackle this problem, a comprehensive mathematical model of Identity and Identity Management has been developed. The model has been used to analyse several phenomenons of Identity Management and to characterise different Identity Management models. Next, three popular Identity Management Systems have been compared using a taxonomy of requirements to identify the strength and weakness of each system. One of the major findings is that how different privacy requirements are satisfied in these systems is not standardised and depends on a specific implementation. Many systems even do not satisfy many of those requirements which can drastically affect the privacy of a user. To tackle the identified problems, the concept of a novel Identity Management System, called User-controlled Identity Management System, has been proposed. This system offers better privacy and allows users to exert more control over their data from a central location using a novel type of provider, called Portable Personal Identity Provider, hosted inside a smart mobile device of the user. It has been analysed how the proposed system can tackle the stated problems effectively and how it opens up new doors of opportunities for online services. In addition, it has been investigated how contextual information such as a location can be utilised to provide online services using the proposed provider. One problem in the existing Identity Management Systems is that providers cannot provide any contextual information such as the location of a user. Hosting a provider in a mobile device allows it to access different sensors of the device, retrieve contextual information from them and then to provide such information. A framework has been proposed to harness this capability in order to offer innovative services. Another major issue of the current Identity Management Systems is the lack of an effective mechanism to combine attributes from multiple providers. To overcome this problem, an architecture has been proposed and it has been discussed how this architecture can be utilised to offer innovative services. Furthermore, it has been analysed how the privacy of a user can be improved using the proposed provider while accessing such services. Realising these proposals require that several technical barriers are overcome. For each proposal, these barriers have been identified and addressed appropriately along with the respective proof of concept prototype implementation. These prototypes have been utilised to illustrate the applicability of the proposals using different use-cases. Furthermore, different functional, security and privacy requirements suitable for each proposal have been formulated and it has been analysed how the design choices and implementations have satisfied these requirements. Also, no discussion in Identity Management can be complete without analysing the underlying trust assumptions. Therefore, different trust issues have been explored in greater details throughout the thesis.
APA, Harvard, Vancouver, ISO, and other styles
6

Gestin, Mathieu. "Privacy-preserving and fully distributed identity management systems." Electronic Thesis or Diss., Université de Rennes (2023-....), 2024. http://www.theses.fr/2024URENS065.

Full text
Abstract:
Dans cette thèse, nous nous intéressons aux systèmes de gestion d’identité totalement distribués respectant la vie privée. Ces systèmes ont pour but de permettre à un utilisateur de s’authentifier et d’être autorisé par un fournisseur de services, tout en ne lui révélant que les informations strictement nécessaires. De plus, ces systèmes doivent être résilients à la présence de processus malveillant. Dans ce contexte, nous nous intéressons à deux points. D’abord, aux certificats anonymes et à leur propriétés de respect de la vie privée. Nous identifions un manque qui réduit cette propriété dans l’état de l’art, et nous le corrigeons grâce à un nouveau type de signature : les certificats anonymes à émetteurs cachés. Ensuite, nous nous intéressons aux algorithmes distribués utilisés pour les propriétés annexes des systèmes de gestion d’identité distribués, notamment pour la révocation de certificats, ou la gestion de clés publiques. Nous analysons formellement ces problèmes, notamment du point de vue de leur consensus number. Ces analyses nous permettent finalement de proposer des algorithmes pour implémenter un système de gestion de l’identité totalement distribué qui nécessite une synchronisation réduite. En d’autres termes, un système où l’utilisation d’algorithmes de consensus est réduite au minimum<br>This thesis focuses on privacy preserving and fully distributed identity management systems. These systems aim to allow a user to authenticate and be authorized by a service provider while only revealing strictly necessary information. In addition, these systems must be resilient to the presence of malicious processes. In this context, we are interested in two points. Firstly, anonymous credentials and their privacy properties. We identify a shortcoming that reduces this property in state of the art, and we correct it with a new type of signature: hidden issuer anonymous credentials. Next, we look at the distributed algorithms used for the auxiliary properties of distributed identity management systems, in particular for certificate revocation and public key management. We analyze these problems formally, particularly from the point of view of their consensus number. Finally, these analyses allow us to propose algorithms for implementing a fully distributed identity management system that requires reduced synchronization. In other words, a system where the use of consensus algorithms is reduced to a minimum
APA, Harvard, Vancouver, ISO, and other styles
7

Gustab, Tomáš. "Řízení identit v bance." Master's thesis, Vysoká škola ekonomická v Praze, 2015. http://www.nusl.cz/ntk/nusl-201662.

Full text
Abstract:
The main focus of this thesis is to analyse the identity management of Czech bank. The author deals with the authentication and authorization of bank employees, the lifecycle of identities and also suggests the operational improvement of systems that relate to identity management. The aim is to show the view from every angle on identity management, highlight the problems and propose countermeasures, respectively measures to improve the identity management running.The main methods of research are analysis of documents, unstructured interview with employees and observation of systems operation. The benefit of this work is in providing author's opinion and recommendations, which can lead to an overall better running identity management in the bank.
APA, Harvard, Vancouver, ISO, and other styles
8

Song, Theo Sagita. "Identity Verification and Conflict in Distributed Teams." Diss., The University of Arizona, 2007. http://hdl.handle.net/10150/194805.

Full text
Abstract:
Previous studies have explored self-verification theory to explain the relationship between self-verification and relationship conflict in collocated teams. This study expanded the application of self-verification theory in distributed team environments. More specifically, this study investigated the effects of similarity of personal identities on self-verification and the effects of self-verification on relationship conflict in both collocated and distributed teams. In addition to the self-verification theory, other identity related theories and communication theories were used to develop the hypotheses and to analyze the results. The hypotheses subsequently were tested using Partial Least Squares models. Participants of this study were members of one of the collocated or distributed engineering design teams. The findings show evidence of the moderation of team type on the relationship between self-verification and relationship conflict. The findings suggest that similarity of personal identities positively affects self-verification in collocated teams but not in distributed teams. Self-verification, in turn, reduces relationship conflict in collocated teams and increases relationship conflict in distributed teams. The implications of the findings on the theories, especially self-verification theory, are discussed.
APA, Harvard, Vancouver, ISO, and other styles
9

Jaferian, Pooya. "User-centered design of identity and access management systems." Thesis, University of British Columbia, 2014. http://hdl.handle.net/2429/51243.

Full text
Abstract:
IT security management (ITSM) technologies are important components of IT security in organizations. But there has been little research on how ITSM technologies should incorporate human and social issues into their design. Identity and Access Management (IAM) systems, as an important category of ITSM, share such a gap with other ITSM technologies. The overreaching goal of this research is to narrow the gap between IAM technologies and social context. In the first phase, we developed a set of usability guidelines, and heuristics for design and usability evaluation of ITSM tools. We gathered recommendations related to ITSM tools from the literature, and categorized them into a set of 19 high-level guidelines that can be used by ITSM tool designers. We then used a methodical approach to create seven heuristics for usability evaluation of ITSM tools and named them ITSM heuristics. With a between-subjects study, we compared the usage of the ITSM and Nielsen's heuristics for evaluation of a commercial IAM system. The results confirmed the effectiveness of ITSM heuristics, as participants who used the ITSM heuristics found more problems categorized as severe than those who used Nielsen's. In the second phase, we conducted a field-study of 19 security practitioners to understand how they do IAM and identify the challenges they face. We used a grounded theory approach to collect and analyze data and developed a model of IAM activities and challenges. Built on the model, we proposed a list of recommendations for improving technology or practice. In the third phase, we narrowed down our focus to a specific IAM related activity, access review. We expanded our understanding of access review by further analysis of the interviews, and by conducting a survey of 49 security practitioners. Then, we used a usability engineering process to design AuthzMap, a novel user-interface for reviewing access policies in organizations. We conducted a user study with 430 participants to compare the use of AuthzMap with two existing access review systems. The results show AuthzMap improved the efficiency in five of the seven tested tasks, and improved accuracy in one of them.<br>Applied Science, Faculty of<br>Electrical and Computer Engineering, Department of<br>Graduate
APA, Harvard, Vancouver, ISO, and other styles
10

Pengiran, Salleh Ab Rahaman P. A. "A human-centred approach to national identity management systems." Thesis, University College London (University of London), 2012. http://discovery.ucl.ac.uk/1370642/.

Full text
Abstract:
This thesis explores the concept of a human-centred Identity Management System (IDMS), and how it can be implemented by organisations. The review of the literature on previous approaches to identity (i.e. privacy, trust, and usability) reveals that claims of IDMS being ‘human-centred’ are rhetorical; in reality, organisations’ administrative convenience is prioritised over the needs of individuals who are treated as purely functional components within the IDMS ecosystem. The research conducted to build a human-centred identity concept involved three separate studies, each approaching the question of identity from a different perspective. Study 1, the system study, focused on the design of IDMS and its impact on individuals’ everyday lives. A total of 14 different past and present N-IDMS implementations were analysed using thematic coding. The result of the study was the development of a framework that expressed a system in terms of a set of structural and metrical design properties, and how these can shape the individuals’ lived experience of identity. Study 2, the individual study, explored individuals’ perceptions and initial acceptance of N-IDMS. Grounded Theory analysis was applied to the data from 15 focus group discussions (groups consisted of 3 participants who were all either of British, Indian, or Bruneian nationality). The study revealed that individuals’ decision to accept an IDMS are influenced by their situation perception, system judgment, and concerns. These findings were further refined through the use of a survey study. The individual study also explored the impacts of National Culture on individuals’ perception of an IDMS. Finally, the third study took an organisation-centric approach, through the analysis of documentation and interviews on the current N-IDMS implementations in 3 different countries (UK, Brunei, and India). Exploring identity as a strategic resource, the study developed a set of organisational requirements around the identity creation and identity application processes, which have an influence the design of the IDMS. The main contribution of this thesis is the development of a unified framework that provides a complete narrative of the identity situation, from planning and design to individual perceptions, as well as the impacts on the lived experience. The findings of this research have been validated through the use of expert evaluations, which have found the framework to be complete and useful for both practitioners and researchers.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Identity management systems"

1

author, Takahashi Kenji, ed. Identity management: Concepts, technologies, and systems. Artech House, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Grady, Jeffrey O. System management: Planning, enterprise identity, and deployment. 2nd ed. Taylor & Francis, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Camenisch, Jan. Privacy and Identity Management for Life. Springer-Verlag Berlin Heidelberg, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Royer, Denis. Enterprise Identity Management: Towards an Investment Decision Support Approach. Springer Berlin Heidelberg, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

International Business Machines Corporation. International Technical Support Organization, ed. z/OS identity propagation. IBM, International Technical Support Organization, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Camenisch, Jan. Digital Privacy: PRIME - Privacy and Identity Management for Europe. Springer Berlin Heidelberg, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

William, Dutcher, Khan Jamil, and National Institute of Standards and Technology (U.S.), eds. An ontology of identity credentials. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Fischer-Hübner, Simone. Policies and Research in Identity Management: Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013. Proceedings. Springer Berlin Heidelberg, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

G, Straus Susan, ed. Patient privacy, consent, and identity management in health information exchange: Issues for the military health system. RAND, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Penny, Duquenoy, Hansen Marit, Leenes Ronald, Zhang Ge, and SpringerLink (Online service), eds. Privacy and Identity Management for Life: 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers. IFIP International Federation for Information Processing, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Identity management systems"

1

Ashbourn, Julian. "Identity Management." In Guide to Biometrics for Large-Scale Systems. Springer London, 2011. http://dx.doi.org/10.1007/978-0-85729-467-8_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Glässer, Uwe, and Mona Vajihollahi. "Identity Management Architecture." In Annals of Information Systems. Springer US, 2009. http://dx.doi.org/10.1007/978-1-4419-1325-8_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Berbar, A., and A. Belkhir. "Blockchain-Based Identity Management." In Lecture Notes in Networks and Systems. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-60629-8_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dólera Tormo, Ginés, Félix Gómez Mármol, and Gregorio Martínez Pérez. "Identity Management in Cloud Systems." In Security, Privacy and Trust in Cloud Systems. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38586-5_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Royer, Denis. "A Decision Support Model for the Introduction of EIdM Systems." In Enterprise Identity Management. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-35040-5_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Satybaldy, Abylay, Mariusz Nowostawski, and Jørgen Ellingsen. "Self-Sovereign Identity Systems." In Privacy and Identity Management. Data for Better Living: AI and Privacy. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42504-3_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Backhouse, James, and Ruth Halperin. "Approaching Interoperability for Identity Management Systems." In The Future of Identity in the Information Society. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01820-6_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Prakken, Bart. "The Identity of Management Information Systems." In Information, Organization and Information Systems Design. Springer US, 2000. http://dx.doi.org/10.1007/978-1-4615-4421-0_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Manders-Huits, Noëmi, and Jeroen Hoven. "Moral identification in Identity Management Systems." In The Future of Identity in the Information Society. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-79026-8_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Preuveneers, Davy. "Identity Management for Cyber-Physical Systems." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-642-27739-9_1727-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Identity management systems"

1

M, Ponni Valavan, Shahazad Niwazi Qurashi, Farrukh Sobia, Faraj Harahsheh, Suseendran Surendran, and S. Suma Christal Mary. "Decentralized Identity Management Using Blockchain for Healthcare Systems." In 2024 IEEE Silchar Subsection Conference (SILCON). IEEE, 2024. https://doi.org/10.1109/silcon63976.2024.10910771.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tabbassum, Ayisha, Pradeep Chintale, Charankumar Akiri, and Nishit Bhasin. "Leveraging Block chain for Secure and Decentralized Identity Management." In 2024 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS). IEEE, 2024. https://doi.org/10.1109/icbds61829.2024.10837296.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pöhn, Daniela, and Heiner Lüken. "Got Ya!: Sensors for Identity Management Specific Security Situational Awareness." In 11th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2025. https://doi.org/10.5220/0013092900003899.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ghosh, Ananya, Sarthak Salokhe, Rigved Mankame, and Vaishali Kumar. "Blockchain Based Identity Management and Verification System for Educational Institutions." In 2024 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS). IEEE, 2024. https://doi.org/10.1109/icbds61829.2024.10837049.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hong, Jianan, Jiayue Zhou, Yuqing Li, Jia Cheng, and Cunqing Hua. "AcBF: A Revocable Blockchain-Based Identity Management Enabling Low-Latency Authentication." In 2024 IEEE 44th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2024. http://dx.doi.org/10.1109/icdcs60910.2024.00037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chehab, Maya I., and Ali E. Abdallah. "Assurance in identity management systems." In 2010 Sixth International Conference on Information Assurance and Security (IAS). IEEE, 2010. http://dx.doi.org/10.1109/isias.2010.5604073.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Arabo, Abdullahi, Mike Kennedy, Qi Shi, Madjid Merabti, David Llewellyn-Jones, and Kashif Kifayat. "Identity management in System-of-Systems Crisis Management situation." In 2011 6th International Conference on System of Systems Engineering (SoSE). IEEE, 2011. http://dx.doi.org/10.1109/sysose.2011.5966570.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

L'Amrani, Hasnae, Badr Eddine Berroukech, Younes El Bouzekri El Idrissi, and Rachida Ajhoun. "Identity management systems: Laws of identity for models7 evaluation." In 2016 4th IEEE International Colloquium on Information Science and Technology (CIST). IEEE, 2016. http://dx.doi.org/10.1109/cist.2016.7804984.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dabrowski, Marcin, and Piotr Pacyna. "Blockchain-based identity dicovery between heterogenous identity management systems." In 2022 6th International Conference on Cryptography, Security and Privacy (CSP). IEEE, 2022. http://dx.doi.org/10.1109/csp55486.2022.00032.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Fongen, Anders. "Identity Management without Revocation." In 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE). IEEE, 2010. http://dx.doi.org/10.1109/securware.2010.20.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Identity management systems"

1

Lesavre, Loïc. A Taxonomic Approach to Understanding Emerging Blockchain Identity Management Systems. National Institute of Standards and Technology, 2020. http://dx.doi.org/10.6028/nist.cswp.01142020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lesavre, Loïc. A Taxonomic Approach to Understanding Emerging Blockchain Identity Management Systems. National Institute of Standards and Technology, 2020. http://dx.doi.org/10.6028/nist.cswp.9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Santoro, Fabrizio, Celeste Scarpini, and Stephen Okiya. The Potential of Digital ID Systems for Tax Administration: the Case of Ghana. Institute of Development Studies, 2025. https://doi.org/10.19088/ictd.2025.011.

Full text
Abstract:
Growing interest in building digital public infrastructure stems from the belief that robust digital identification systems (DIS) can drive significant development gains. Foundational DIS provide unique identifiers to manage identity data across public and private transactions (World Bank 2024). They enable governments to integrate data, facilitating improvements in taxation, public financial management, and social protection. In low-income countries (LICs) DIS can enhance taxpayer registration by linking individuals to verified IDs, reducing errors and reliance on self-reporting (Santoro, Prichard and Mascagni 2024). This is particularly relevant in Africa, where curbing informality and achieving ambitious registration targets is a priority. DIS can identify informal operators, streamline registration, and improve taxpayer experience by reducing compliance costs and increasing transparency. Better data quality from DIS also helps monitoring and enforcement, ensuring compliance and enabling data-driven governance. As this study shows, while ID data can help tax administration to register taxpayers and raise more revenue, to fully unlock the potential from ID systems more effort is needed to target enforcement, improve services, and integrate systems. Summary of ICTD African Tax Administration Paper 39.
APA, Harvard, Vancouver, ISO, and other styles
4

Grizzle, K., M. Ansari, E. Wahlstroem, and C. Mortimore. System for Cross-domain Identity Management: Protocol. Edited by P. Hunt. RFC Editor, 2015. http://dx.doi.org/10.17487/rfc7644.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Grizzle, K., E. Wahlstroem, and C. Mortimore. System for Cross-domain Identity Management: Core Schema. Edited by P. Hunt. RFC Editor, 2015. http://dx.doi.org/10.17487/rfc7643.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hunt, P., B. Khasnabish, A. Nadalin, and Z. Zeltsan. System for Cross-domain Identity Management: Definitions, Overview, Concepts, and Requirements. Edited by K. LI. RFC Editor, 2015. http://dx.doi.org/10.17487/rfc7642.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Emes, Michael, and William Griffiths. Systems thinking: How is it used in project management? Association for Project Management, 2018. http://dx.doi.org/10.61175/gjmz4716.

Full text
Abstract:
This study builds on the work used to establish the Systems Thinking SIG as they seek to identify the range of activities classified as systems thinking and how these are seen to add value to projects. The study aims to produce a guide on how to apply systems thinking in projects and to understand whether systems thinking is a critical success factor in complex projects.
APA, Harvard, Vancouver, ISO, and other styles
8

Bell, Matthew, and David Kack. Setting up ROaDS Partners with Customized Surveys: Final Report. Western Transportation Institute, 2024. http://dx.doi.org/10.15788/1727735231.

Full text
Abstract:
The Roadkill Observation and Data System (ROaDS) project, developed through a partnership between the U.S. Fish and Wildlife Service, National Park Service, and the Western Transportation Institute at Montana State University, provides a user-friendly data collection system to monitor wildlife-vehicle collisions (WVCs) and identify safe crossing locations on roads managed by federal land management agencies (FLMAs). This report outlines recent outreach efforts and successful implementation of the ROaDS system with external partners, including the Nevada Department of Transportation (NDOT) and the Indiana Department of Natural Resources (IDNR). Custom surveys were developed for these agencies to address specific data collection and conservation goals, resulting in improved capacity to monitor WVCs and identify high-risk areas for targeted mitigation. The project has garnered interest from several other state transportation agencies, showcasing the adaptability of the ROaDS system for diverse road and wildlife management applications. The successful deployment in Nevada and Indiana demonstrates the system’s potential to support data-driven decision-making and enhance wildlife connectivity across the country.
APA, Harvard, Vancouver, ISO, and other styles
9

Willson, Stephanie, and Kristen Miller. Cognitive interview Evaluation of Demographic Questions for the US Department of State Global Employee Management System. National Center for Health Statistics (U.S.), 2023. http://dx.doi.org/10.15620/cdc/150786.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Piercy, Candice, Brandon Boyd, Emily Russ, and Kyle Runion. Systematic beneficial use of dredged sediments : matching sediment needs with dredging requirements. Engineer Research and Development Center (U.S.), 2022. http://dx.doi.org/10.21079/11681/45443.

Full text
Abstract:
This technical note (TN) will outline a framework to identify beneficial and cost-effective coastal beneficial use of dredged sediment (BUDS) projects. Creation of a BUDS framework that can be applied at scale will promote sustainable BUDS practices, facilitating the delivery of flood risk management, social, and environmental benefits while still fulfilling the US Army Corps of Engineers (USACE) navigation mission. This proactive forecasting approach uses multi-criteria decision analysis (MCDA) and optimization tools to balance tradeoffs between navigation dredging and BUDS goals over project-scale timespans. The proposed framework utilizes available tools to quantify ecological system evolution and current and future dredging needs to develop a systems-level approach to BUDS. Required data include current and future information on (1) existing and planned natural and created aquatic ecological systems, which may include natural and nature-based features (NNBFs), (2) dredging requirements and costs, and (3) aquatic system physical and environmental data.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!