Journal articles on the topic 'Identity management systems'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Identity management systems.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Kumar, Vikas, and Aashish Bhardwaj. "Identity Management Systems." International Journal of Strategic Decision Sciences 9, no. 1 (2018): 63–78. http://dx.doi.org/10.4018/ijsds.2018010105.
Full textTracy, Kim. "Identity management systems." IEEE Potentials 27, no. 6 (2008): 34–37. http://dx.doi.org/10.1109/mpot.2008.929295.
Full textBackhouse, James. "Interoperability of identity and identity management systems." Datenschutz und Datensicherheit - DuD 30, no. 9 (2006): 568–70. http://dx.doi.org/10.1007/s11623-006-0145-y.
Full textWayman, James L. "Biometrics in Identity Management Systems." IEEE Security & Privacy Magazine 6, no. 2 (2008): 30–37. http://dx.doi.org/10.1109/msp.2008.28.
Full textHariharan, Ramanan. "AI-Driven Identity and Access Management in Enterprise Systems." International journal of IoT 05, no. 01 (2025): 62–94. https://doi.org/10.55640/ijiot-05-01-05.
Full textAl Khouri, Ali M. "PKI in Government Identity Management Systems." International Journal of Network Security & Its Applications 3, no. 3 (2011): 69–96. http://dx.doi.org/10.5121/ijnsa.2011.3306.
Full textMaha, Aldosary, and Alqahtani Norah. "A SURVEY ON FEDERATED IDENTITY MANAGEMENT SYSTEMS LIMITATION AND SOLUTIONS." International Journal of Network Security & Its Applications (IJNSA) 13, no. 3 (2021): 43–59. https://doi.org/10.5281/zenodo.4978701.
Full textYadav, Susheel. "Decentralizing Identity with Blockchain Technology in Digital Identity Management." Journal of Current Research in Blockchain 1, no. 3 (2024): 178–89. https://doi.org/10.47738/jcrb.v1i3.22.
Full textManimaran, Praveensankar, Thiago Garrett, Leander Jehl, and Roman Vitenberg. "Decentralization trends in identity management: From federated to Self-Sovereign Identity Management Systems." Computer Science Review 58 (November 2025): 100776. https://doi.org/10.1016/j.cosrev.2025.100776.
Full textPacyna, Piotr, Anthony Rutkowski, Amardeo Sarma, and Kenji Takahashi. "Trusted Identity for All: Toward Interoperable Trusted Identity Management Systems." Computer 42, no. 5 (2009): 30–32. http://dx.doi.org/10.1109/mc.2009.168.
Full textLiu, Yang, Debiao He, Mohammad S. Obaidat, Neeraj Kumar, Muhammad Khurram Khan, and Kim-Kwang Raymond Choo. "Blockchain-based identity management systems: A review." Journal of Network and Computer Applications 166 (September 2020): 102731. http://dx.doi.org/10.1016/j.jnca.2020.102731.
Full textKshitij Varshney. "Digital Identity Management Using Biometric Systems: BioTrace." Journal of Information Systems Engineering and Management 10, no. 51s (2025): 374–85. https://doi.org/10.52783/jisem.v10i51s.10396.
Full textXu, Hong, Jianqing Chen, and Andrew B. Whinston. "Identity Management and Tradable Reputation." MIS Quarterly 42, no. 2 (2018): 577–93. http://dx.doi.org/10.25300/misq/2018/13634.
Full textGobika S. and Vaishnavi N. M.Sc., M.Phil., (Ph.D.). "Blockchain Based Identity Management System." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 1413–20. https://doi.org/10.32628/cseit25112471.
Full textL’Amrani, Hasnae, Younès EL Bouzekri EL Idrissi, and Rachida Ajhoun. "Identity Management Systems: Techno-Semantic Interoperability for Heterogeneous Federated Systems." Computer and Information Science 11, no. 3 (2018): 102. http://dx.doi.org/10.5539/cis.v11n3p102.
Full textSeshagiri, Asha. "METHODS FOR PREVENTING SQL INJECTION IN IDENTITY AND ACCESS MANAGEMENT (IAM) SYSTEMS." American Journal of Engineering and Technology 6, no. 10 (2024): 17–22. http://dx.doi.org/10.37547/tajet/volume06issue10-03.
Full textAl zoubi, Qusay M., Yousef K. Sanjalawe, and Mohammed Anbar. "An evaluation of identity and access management systems." International Journal of Internet Technology and Secured Transactions 11, no. 1 (2021): 35. http://dx.doi.org/10.1504/ijitst.2021.10035182.
Full textSanjalawe, Yousef K., Mohammed Anbar, and Qusay M. Al zoubi. "An evaluation of identity and access management systems." International Journal of Internet Technology and Secured Transactions 11, no. 1 (2021): 35. http://dx.doi.org/10.1504/ijitst.2021.112868.
Full textWang, Feng, Ge Bao Shan, Yong Chen, et al. "Identity Authentication Security Management in Mobile Payment Systems." Journal of Global Information Management 28, no. 1 (2020): 189–203. http://dx.doi.org/10.4018/jgim.2020010110.
Full textSanchez Garcia, Sergio, Ana Gomez Oliva, Emilia Perez Belleboni, and Ivan Pau de la Cruz. "Current Trends in Pan-European Identity Management Systems." IEEE Technology and Society Magazine 31, no. 3 (2012): 44–50. http://dx.doi.org/10.1109/mts.2012.2211154.
Full textBirrell, Eleanor, and Fred B. Schneider. "Federated Identity Management Systems: A Privacy-Based Characterization." IEEE Security & Privacy 11, no. 5 (2013): 36–48. http://dx.doi.org/10.1109/msp.2013.114.
Full textFischer-Hübner, Simone, and Hans Hedbom. "Benefits of Privacy-Enhancing Identity Management." Asia Pacific Business Review 4, no. 4 (2008): 3–13. http://dx.doi.org/10.1177/097324700800400401.
Full textVan Zoonen, Liesbet, and Georgina Turner. "Exercising identity: agency and narrative in identity management." Kybernetes 43, no. 6 (2014): 935–46. http://dx.doi.org/10.1108/k-06-2013-0126.
Full textAlamri, Bandar, Katie Crowley, and Ita Richardson. "Cybersecurity Risk Management Framework for Blockchain Identity Management Systems in Health IoT." Sensors 23, no. 1 (2022): 218. http://dx.doi.org/10.3390/s23010218.
Full textPhanireddy, Sandeep. "AI-Driven Identity Access Management (IAM)." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 05, no. 06 (2021): 1–9. https://doi.org/10.55041/ijsrem8931.
Full textPratik Jain. "Identity and Access Management in the Cloud." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 1528–35. https://doi.org/10.32628/cseit25112523.
Full textKhajehei, Kamyab. "Role of Identity Management Systems in Cloud Computing Privacy." International Journal of Education and Management Engineering 7, no. 3 (2017): 25–34. http://dx.doi.org/10.5815/ijeme.2017.03.03.
Full textRoßnagel, Heiko, Jan Zibuschka, Oliver Hinz, and Jan Muntermann. "Users' willingness to pay for web identity management systems." European Journal of Information Systems 23, no. 1 (2014): 36–50. http://dx.doi.org/10.1057/ejis.2013.33.
Full textWu, Shuheng, Besiki Stvilia, and Dong Joon Lee. "Exploring researchers' participation in online research identity management systems." Proceedings of the Association for Information Science and Technology 53, no. 1 (2016): 1–6. http://dx.doi.org/10.1002/pra2.2016.14505301105.
Full textKhajehei, Kamyab. "Preserving Privacy in Cloud Identity Management Systems Using DCM (Dual Certificate Management)." International Journal of Wireless and Microwave Technologies 8, no. 4 (2018): 54–65. http://dx.doi.org/10.5815/ijwmt.2018.04.04.
Full textHerwanto, Riko, Eddy Sumartono, Didit Saputra, Salman Farizy, and Farida Hasanah. "Enhancing Cybersecurity with Blockchain-based Identity Management." Global International Journal of Innovative Research 2, no. 8 (2024): 1951–65. http://dx.doi.org/10.59613/global.v2i8.288.
Full textZhu, Xiaoyang, and Youakim Badr. "Identity Management Systems for the Internet of Things: A Survey Towards Blockchain Solutions." Sensors 18, no. 12 (2018): 4215. http://dx.doi.org/10.3390/s18124215.
Full textBouras, Mohammed Amine, Qinghua Lu, Fan Zhang, Yueliang Wan, Tao Zhang, and Huansheng Ning. "Distributed Ledger Technology for eHealth Identity Privacy: State of The Art and Future Perspective." Sensors 20, no. 2 (2020): 483. http://dx.doi.org/10.3390/s20020483.
Full textDeng, Xudong, Chengliang Tian, Fei Chen, and Hequn Xian. "Designated-Verifier Anonymous Credential for Identity Management in Decentralized Systems." Mobile Information Systems 2021 (September 9, 2021): 1–15. http://dx.doi.org/10.1155/2021/2807395.
Full textJovanovic, Bojan, Ivan Milenkovic, Marija Bogicevic-Sretenovic, and Dejan Simic. "Extending identity management system with multimodal biometric authentication." Computer Science and Information Systems 13, no. 2 (2016): 313–34. http://dx.doi.org/10.2298/csis141030003j.
Full textLi, Dong Mei, Yong Hong Wang, and Jian Yong Chen. "Trust Federation of Identity Management in Distributed Environment." Advanced Materials Research 605-607 (December 2012): 2574–78. http://dx.doi.org/10.4028/www.scientific.net/amr.605-607.2574.
Full textResearcher. "MODERNIZING IDENTITY MANAGEMENT: TRANSITIONING FROM LEGACY SYSTEMS TO SSO IMPLEMENTATION." International Journal of Research In Computer Applications and Information Technology (IJRCAIT) 7, no. 2 (2024): 1756–68. https://doi.org/10.5281/zenodo.14266705.
Full textCrompton, Malcolm. "User-centric identity management: An oxymoron or the key to getting identity management right?" Information Polity 15, no. 4 (2010): 291–97. http://dx.doi.org/10.3233/ip-2010-0193.
Full textAldosary, Maha, and Norah Alqahtani. "A Survey on Federated Identity Management Systems Limitation and Solutions." International Journal of Network Security & Its Applications 13, no. 03 (2021): 43–59. http://dx.doi.org/10.5121/ijnsa.2021.13304.
Full textBeynon‐Davies, Paul. "Personal identity management and electronic government." Journal of Enterprise Information Management 20, no. 3 (2007): 244–70. http://dx.doi.org/10.1108/17410390710740727.
Full textRanga, Premsai. "Blockchain Technology in Identity Management: Enhancing Cybersecurity Frameworks." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 11, no. 6 (2023): 1–16. https://doi.org/10.5281/zenodo.14280061.
Full textNikhil Ghadge. "Enhancing threat detection in Identity and Access Management (IAM) systems." International Journal of Science and Research Archive 11, no. 2 (2024): 2050–57. http://dx.doi.org/10.30574/ijsra.2024.11.2.0761.
Full textJournal, of Global Research in Multidisciplinary Studies(JGRMS). "Blockchain for Secure Identity Management: A Review on Decentralized Authentication Systems." Journal of Global Research in Multidisciplinary Studies(JGRMS) 01, no. 02 (2025): 01–06. https://doi.org/10.5281/zenodo.15245191.
Full textRamakrishnan, Shanmugavelan. "Enhancing Incident Detection and Response through Zero Trust Implementation in Identity and Access Management Systems." International Journal of Science and Research (IJSR) 10, no. 12 (2021): 1480–85. http://dx.doi.org/10.21275/sr24314030143.
Full textKyaw, Soe Moe, and Mya Thwe Mya. "Investigation of Blockchain Based Identity System for Privacy Preserving University Identity Management System." International Journal of Trend in Scientific Research and Development 3, no. 6 (2019): 336–41. https://doi.org/10.5281/zenodo.3587851.
Full textGOMI, Hidehito. "Authentication Trust Metric and Assessment for Federated Identity Management Systems." IEICE Transactions on Information and Systems E95-D, no. 1 (2012): 29–37. http://dx.doi.org/10.1587/transinf.e95.d.29.
Full textWaleed A. Alrodhan. "Enhancing User Privacy in Information Card-Based Identity Management Systems." International Journal of Engineering and Industries 2, no. 3 (2011): 76–85. http://dx.doi.org/10.4156/ijei.vol2.issue3.8.
Full textVulic, Marko, Marko Rankovic, and Vojkan Vaskovic. "Identity Management In Modern Business - An Example Of Cloud Systems." Management - Journal for theory and practice of management 17, no. 63 (2012): 55–62. http://dx.doi.org/10.7595/management.fon.2012.0008.
Full textDevlekar, Sanket, and Vidyavati Ramteke. "Identity and Access Management: High-level Conceptual Framework." Revista Gestão Inovação e Tecnologias 11, no. 4 (2021): 4885–97. http://dx.doi.org/10.47059/revistageintec.v11i4.2511.
Full textS., Devlekar,, and Ramteke, V. "Identity and Access Management: High-level Conceptual Framework." CARDIOMETRY, no. 24 (November 30, 2022): 393–99. http://dx.doi.org/10.18137/cardiometry.2022.24.393399.
Full text