Index
This page uses labels linked to bibliographic entries in this section of the wiki to produce a keyword index.
-
A
- aad
- abac
- abacsh
- abac-α
- access
- access-certification
- access-control
- access-control-mechanism
- access-control-misconfiguration
- access-control-model
- access-control-policy
- access-control-system
- access-control-validation
- access-denied
- access-governance
- access-management
- access-matrix
- access-recertification
- access-review
- access-token
- account
- account-behavior
- account-behavior-analysis
- accreditation
- acl
- active-adversary
- active-directory
- activity-based-rules
- adair
- adaptive-authentication
- adis
- advanced-threats
- ag
- agile
- ai
- ajayi
- akamai
- akande
- akey
- alamri
- alazab
- albanese
- algebra
- allan
- allende-lopez
- altman
- aml
- analyst-report
- analytics
- anand
- anderson
- anonymization
- anti-fraud
- anti-money-laundering
- anti-terrorism
- antonucci
- apache-knox
- api-gateway
- application
- application-multiplexing
- application-onboarding
- aps
- aravindharamanan
- arbac97
- architecture
- architecture-design
- article
- artificial-intelligence
- association
- assurance
- astrahan
- atlas-identity
- atos
- attack-pattern
- attack-simulation
- attack-vector
- attribute
- attribute-based-access-control
- audiobook
- audit
- auditing
- auth0
- authentication
- authentication-factor
- authentication-friction
- authentication-method
- authentication-scheme
- authorization
- authorization-policy
- authorization-server
- authorization-service
- awaysheh
- aws
- aws-iam
- aws-iam-policy
- aws-policy
- aws-policy-simulator
- axiomatics
- axiomatics-policy-server
- ayyagari
- azure-active-directory
- azure-ad
-
B
- b2b
- b2c
- balanced-scorecard
- balloo
- bank-id
- banking
- bannazadeh
- barkworth
- barrico
- bbca
- beaman
- beautement
- behavior
- behavioral-analysis
- behavioral-authentication
- behavioral-based-rules
- behavior-based-continuous-authentication
- bell
- bell-lapadula
- bell-lapadula-model
- bellovin
- benantar
- berlin
- bertino
- bessell
- best-practices
- beth
- beth-identification-scheme
- bhaskar
- bibliographic-entry
- big-data
- bing
- biometrics
- bishop
- biswas
- black-hat
- blain
- blakley
- blockchain
- blog
- blog-post
- blokdyk
- blp
- board-of-directors
- book
- book-section
- boolean-algebra
- bottom-up
- bploc
- bpm
- bpm-bibliographic-entry
- bpmm
- bradley
- breach
- bresz
- bring-your-own-identity
- broadcom
- brotherston
- brunenmeister
- bureau
- burgers
- buschmann
- business
- business-case
- business-manager
- business-performance
- business-process
- business-process-maturity
- business-requirement
- butterfield
- buyya
- byoid
-
C
- cabaleiro
- cabi
- cached-credential
- calmet
- campbell
- cao
- capability
- capability-maturity
- capability-maturity-model
- capec
- cappelli
- captcha
- career
- caro
- carroll
- case-study
- casey
- cash
- ca-technologies
- caverlee
- cdd
- ceas
- cellular-security
- cern
- cert
- cert-advisory
- certification
- challenges
- chari
- charter
- chen
- chinese-wall
- chinese-wall-policy
- chip
- chisnell
- chiueh
- choyi
- christen
- ciam
- cics
- cimatti
- cis
- cism
- cissp
- citrix
- classification
- client-initiated-backchannel-authentication
- cloud
- cloud-computing
- cloud-iam
- cloud-identity
- cloud-identity-management
- cloud-security
- cloud-services
- cmm
- cmmi
- cmmi-svc
- cmu
- cnss
- cobit
- cobit-5
- collin
- collinson
- community
- comparison
- completely-automated-public-turing-test-to-tell-computers-and-humans-apart
- compliance
- compliance-bibliographic-entry
- composition
- compromise
- computer-crime
- computer-science
- computer-security
- computing
- conceptual-model
- concept-virus
- concurrent-adversary
- conference
- conference-paper
- connected-intelligence
- conrad
- consortium
- consultant
- context
- continuous-access-control-validation
- control
- coronavirus
- cost
- cost-analysis
- cost-measurement
- counter-threat-unit-research-team
- course-lecture
- covid-19
- covington
- cowart
- crampton
- create-new-page
- credential
- credential-compromise
- credential-harvesting
- credential-leakage
- credentials-based-identity-management-system
- credential-theft
- crescenzo
- crime
- criminal-conviction
- critical-infrastructure
- crocker
- cross-domain
- cryptographic-key
- cryptography
- cryptology
- csirt
- csv
- current-state
- customer-data
- customer-due-diligence
- customer-experience
- customer-identity-and-access-management
- cwe
- cwe-1220
- cwe-268
- cybercrime
- cyberdefense
- cyberdefense-program
- cyber-risk
- cyber-sabotage
- cybersecurity
- cyberthreats
-
D
- dac
- dai
- dame
- dark-halo
- dark-reading
- data
- data-access
- data-access-control
- data-anonymization
- database
- data-breach
- data-classification
- data-control
- data-leakage
- data-leakage-detection
- data-leakage-prevention
- data-lineage
- data-security
- dbir
- de
- decentralized
- decentralized-finance
- decentralized-identifier
- decentralized-identity-foundation
- deehan
- default-configuration
- de-fi
- definition
- delessy
- deloitte
- demotion
- deng
- denis-royer
- denning
- dependable-system
- design-pattern
- detection
- detective-control
- deuker
- dhakal
- diacc
- diam
- diam-iot
- dictionary
- dictionary-entry
- did
- dif
- digest
- digital-business
- digital-continuity
- digital-ecosystem
- digital-employee
- digital-evidence
- digital-forensics
- digital-id
- digital-identity
- digital-rights-management
- digital-transformation
- digital-wallet
- dimensional-research
- diodati
- directory-services
- disaster
- discretionary-access-control
- disruption
- distributed-artificial-intelligence
- distributed-identity
- distributed-identity-management
- distributed-system
- distribute-system
- distributive-lattice
- dlp
- documentation
- doj
- dolcinar
- domain-controller
- doret
- double-spending
- douceur
- downing
- draft
- drm
- duality
- duan
- ducac
- duo-integration-secret-key
- duo-sid
- dynamic-authorization
- dynamic-authorization-management
- dynamic-federated-identity-management
- dynamic-user-centric-access-control
- dziekonski
-
E
- e-book
- ec-council
- eckenrode
- economic-analysis
- economic-impact
- economic-inclusion
- economics
- economy
- edge-authentication
- eid
- eidm
- eidms
- ekembe-ngondi
- ekstedt
- elovici
- employee-demotion
- employee-transfer
- encyclopedia
- encyclopedia-entry
- engagement
- engineering
- engle
- enisa
- enisa-threat-taxonomy
- enterprise-identity-management
- entitlement
- entitlement-based-access-control
- entitlement-card
- entitlement-management
- entitlement-management-process
- entitlement-scheme
- eps
- esd-tr-73-278
- esorics
- etaa
- ethics
- ethz
- etsi
- ett
- europe
- european-commission
- ev80310
- event-model
- everett
- evidian
- expanded-password-system
- extensibility
- extensible-access-control-markup-language
-
F
- fake-identity
- fapi
- faq
- faraji
- fatf
- fbi
- feasibility-study
- federated-identity-management
- federated-identity-scheme
- federation
- feedback
- fehnder
- fenton
- feringa
- fernandez
- ferraiolo
- ferrari
- fidis
- fido
- fido-alliance
- fim
- finance
- financial-cryptography
- financial-grade-api
- financial-institution
- financial-services
- financial-stability-board
- fine-grained-access-control
- finma
- finma-circular
- fintech
- fisma
- flynn
- forensics
- forgerock
- formal-methods
- forrester
- foundation
- foundations
- four-eyes-principle
- frankel
- franqueira
- fraud
- fraudulent-entity
- fravolini
- frequently-asked-questions
- friction
- friction-point
- friedman
- frincke
- fsb
- fu
- fuchs
- furnell
- future
-
G
- g00297468
- g20
- gallaher
- gao
- gartner
- gartner-research-note
- gatchin
- gates
- gavrila
- gayvoronskaya
- gazos
- gdpr
- gebel
- gender
- generator
- geographic-database
- geradts
- germany
- gigg
- gilchrist
- ginn
- gligor
- globalization
- glossary
- golbeck
- gollmann
- good
- goodchild
- goodin
- google-cloud
- gopal
- gopalakrishnan
- goparaju
- gordijn
- govardhan
- grabatin
- granularity
- gravitational
- greenberg
- greitzer
- grid
- grigg
- grimes
- growth
- grun
- gruner
- gsma
- gsm-registration
- guide
- guidelines
-
H
- habeck
- haber
- habiba
- hack
- hacking
- hadoop
- hakak
- halibozek
- hall
- han
- hanauer
- harvesting
- hayden
- health-care-services
- heath
- heenan
- hein
- heisel
- herrmann
- hershkop
- hgabac
- hill
- hitachi-id-systems
- hoang
- home-office
- hommel
- honeypot
- houthooft
- how-to
- hr
- hra
- huang
- human-reliability-analysis
- human-resources
- humbley
- hunker
- hurakadli
- huth
- hwang
- hypr
-
I
- iag
- iam
- iam-architecture
- iam-bibliographic-entry
- iam-cmm
- iam-dictionary-entry
- iam-program
- iam-program-management
- iam-reading-list
- iap
- ibm
- ibm-cloud
- ic3
- icicse
- idaas
- identification
- identification-scheme
- identity
- identity-and-access-governance
- identity-and-access-management
- identity-at-the-center
- identity-aware-proxy
- identity-enrollment
- identity-fabric
- identity-federation
- identity-governance-and-administration
- identity-management
- identity-management-system
- identity-proofing
- identity-propagation
- identity-theft
- identity-wallet
- identiverse
- idm
- idmsecman
- idmsecman-process-framework
- idnext
- idp
- idpro
- idsa
- id-wallet
- iec
- ieee
- ieee-computer
- ietf
- ifc
- ifip
- iga
- iga-capability
- imi
- implementation
- ims
- incident-response
- index-page
- indicator
- indu
- infocard
- information-asset
- information-flow
- information-flow-model
- information-flow-policy
- information-security
- information-security-architecture
- information-society
- information-technology
- information-theft
- infosec-bibliographic-entry
- infrastructure
- infrastructure-access
- in-house
- in-house-identity-management
- inside-attacker
- insider
- insider-attack
- insider-threat
- inter-federation
- internals
- internet
- internet-crime
- internet-of-things
- internet-services
- investment
- ion
- iot
- iot-iam
- ip-theft
- ir4
- isaca
- isaca-journal
- isi
- iso
- iso-iec-21287
- iso-standard
- isse
- it
- it-governance
- it-regulation
- it-sabotage
- it-security
- it-standard
- itu
- ivanovic
- iverson
-
J-K
- jain
- jay
- jiang
- jimenez
- jin
- jml
- job-description
- job-interview
- johnson
- joiner
- joiner-mover-leaver
- joiner-mover-leaver-process
- joiner-process
- joosen
- jorissen
- joshi
- journal-article
- jover
- json
- kalunga
- katsikeas
- kayes
- keeney
- kerberos
- kernel
- keromytis
- kerr
- key-management
- keystroke
- keystroke-dynamics
- khan
- khasuntsev
- killmeyer
- koelewijn
- koessel
- kolbel
- komarova
- koops
- korobeynikov
- koshutanski
- kovacich
- kowalski
- kpmg
- krause
- krishnan
- krol
- kropp
- kuhn
- kumar
- kuo
- kuppinger
- kuppinger-cole
- kuppinger-cole-executive-view
- kuppinger-cole-leadership-compass
- kuppinger-cole-market-compass
- kwong
- kyc
-
L
- labac
- label
- label-based-access-control
- lagerstrom
- lambrinoudakis
- lancaster
- landau
- lapadula
- laplante
- larrondo-petrie
- lattice
- lattice-based-access-control
- law-enforcement
- lbac
- ldap
- le
- leakage
- lean-management
- least-privilege
- least-privilege-principle
- leaver
- leaver-process
- lecture-notes
- lee
- legitimate-privilege-abuse
- leisch
- leon-garcia
- let-s-talk-about-digital-identity
- lexicography
- lexicon
- li
- lifecycle
- lifecycle-management
- ling
- linux
- lio
- list
- literature-review
- lodderstedt
- logical-architecture
- login-radius
- loi
- lopez
- lu
- lyceum
-
M
- ma
- mac
- machulak
- maciel
- maersk
- magic-quadrant
- mail-fraud
- maler
- management
- mandatory-access-control
- mansfield
- manteigueiro
- manulis
- mao
- march
- marcon
- marinos
- market
- market-research
- market-segmentation
- market-segmentation-analysis
- marsh
- martin
- martinelli
- mason
- masood
- masquerade
- masquerade-detection
- masters
- master-thesis
- mathematical-methods
- mathematical-model
- mathew
- matrix
- maturity
- mcintosh
- mckinsey
- mclean
- mcmillan
- measurement
- measurement-topic
- medeiros
- meinel
- mello
- meltzer
- menshchikov
- metrics
- meunier
- mfa
- mfaaas
- mfa-as-a-service
- mfa-bypass
- microblog
- microblogging
- micro-focus
- microsoft
- microsoft-azure-ad
- microsoft-exchange-control-panel
- microsoft-forefront-identity-manager
- microsoft-identity-lifecycle-manager
- microsoft-identity-manager
- microsoft-sql-server
- milgate
- military-lattice
- mim
- misconfiguration
- mit
- mit-kit
- mitre
- mls
- mobile
- mobile-id
- model
- modeling
- molloy
- moore
- morana
- moreland
- mori
- mover
- mover-process
- mowll
- muhle
- multicloud
- multi-factor-as-a-service
- multi-factor-authentication
- multifactor-authentication
- multilevel-security
- multiplexing
-
N
- nag
- naing
- naming-convention
- narvekar
- ncsc
- negols
- nemeth
- netflix
- network
- network-attack
- network-attack-prediction
- network-security
- network-security-architecture
- new-employee-onboarding
- news
- news-article
- newton
- nfc
- ng
- niazi
- nimda
- nist
- nist-ir
- nist-special-publication
- non-compliance
- non-profit
- notpetya
- nsa
-
O
- oauth
- oauth-2-0
- oci
- o-connor
- oecd
- oiam
- oidc
- okta
- olabel
- o-label
- omada
- omarova
- omb-circular
- onboarding
- one-identity
- one-identity-manager
- o-neill
- one-size-fits-all
- ontology
- onyszko
- opa
- openid
- open-id
- openid-connect
- open-measure
- open-policy-agent
- open-source
- open-text
- open-threat-taxonomy
- operational-risk
- opportunities
- opportunity
- optimal-idm
- oracle
- oracle-cloud-infrastructure
- or-bac
- organization
- organizational-structure
- orphan
- orphaned-user
- orphan-user
- osmanoglu
- ott
- otto-group
- outlook-web-access
- outlook-web-application
- owa
- owen
- oxford
-
P
- p
- pagerank
- palsonkennedy
- pam
- pan
- pap
- park
- parvat
- passphrase
- password
- passwordless
- password-less-authentication
- passwordless-authentication
- password-spraying
- password-spraying-attack
- pattern
- pattern-language
- pattern-oriented-software-architecture
- paw
- pbac
- pdp
- pedroli
- peerlyst
- peisert
- pena
- pep
- perception
- performance
- performance-measurement
- pernul
- personal-identity-verification
- personnel-management
- pfleeger
- phiri
- phishing
- phoebe-chen
- physical-security
- ping-identity
- pip
- piv
- pki
- playbook
- pm
- pms
- pms-bibliographic-entry
- podcast
- pohlmann
- pohn
- pokemon
- policy
- policy-administration-point
- policy-analysis
- policy-based-access-control
- policy-decision-point
- policy-enforcement-point
- policy-information-point
- policy-machine
- policy-mining
- pop
- pra97
- prediction
- presentation
- prevention
- preventive-control
- pridohl
- principle
- prison
- privacy
- privacyid3a
- privacyidea
- privilege
- privilege-abuse
- privilege-chaining
- privileged-access
- privileged-access-management
- privileged-account
- privilege-escalation
- probst
- proceedings
- process
- proctor
- product
- program
- program-management
- project-management
- promotion
- proof-of-provenance
- protocol
- provisioning
- proxy
- pu
- public-policy
- public-sector
-
Q-R
- qr-code-authentication
- quote-item
- rahav
- rannenberg
- ransomware
- ransomware-attack
- rao
- rastogi
- rba
- rbac
- rbac0
- rbac1
- rbac2
- rbac3
- rbac96
- readers-writers-flow-model
- reading-list
- recertification
- reed
- reference-architecture
- regulation
- reimer
- reinhold
- rejman-greene
- re-joiner
- remote-access
- remote-identity-proofing
- report
- research
- research-bibliographic-entry
- research-community
- reuters
- review
- rfc
- rfc-2828
- ridp
- risk
- risk-based-authentication
- risk-management
- risk-scenarios
- ritchey
- rodríguez
- rogers
- rohnert
- roi
- rokach
- role
- role-based-access-control
- role-capacity
- role-cardinality
- role-engineering
- role-hierarchies
- rolls
- roquefort-villeneuve
- roy
- royer
- rra97
- ruddy
- rwfm
-
S
- s2s
- sabbatical
- sabotage
- saddington
- sailpoint
- sailpoint-identity-iq
- sailpoint-identity-now
- sailpoint-iiq
- saini
- sakimura
- salesforce
- samarati
- samba
- saml
- saml-federation
- sample
- sandhu
- sans-institute
- sap
- sap-commerce
- sap-hana-academy
- sap-identity-authentication-service
- saracino
- sarai
- sasaoka
- sasse
- savage
- savi
- saviynt
- sayal
- schmidt
- schmitz
- schneider
- schutze
- schwartz
- science
- scim
- scim-2-0
- scorecard
- sdp
- secure-production-identity-framework-for-everyone
- security
- security-architecture
- security-design-pattern
- security-engineering
- security-metric
- security-metric-management
- security-model
- security-models
- security-pattern
- security-policy
- security-profile
- sedgewick
- seeber
- sefm
- sefm-2017
- segment
- segmentation
- segregation-of-duties
- sei
- self-sovereign-identity
- semantic-similarity
- seminal-article
- senko
- sentence
- separation-of-duties
- serverless
- serverless-computing
- service
- service-account
- setlabs
- setlabs-briefings
- sgf
- shabtai
- shah
- shen
- sheng
- shibboleth
- shibli
- shimeall
- shinouda
- shrum
- shu
- shyamasundar
- silo
- silowash
- simon
- sim-swapping
- simulator
- sinclair
- singh
- single-customer-view
- single-sign-on
- sinnott
- siriwardena
- sirjani
- skype
- small
- smer
- smith
- sms
- snyder
- social-honeypot
- social-media
- social-network
- sod
- software
- software-architecture
- software-defined-perimeter
- software-design-pattern
- software-engineering
- software-pattern
- solarwinds
- sommerlad
- sonnenreich
- soudips93
- sovrin
- sovrin-governance-framework
- sox
- spammer
- specialized-dictionary
- specification
- spiffe
- springerbriefs
- sqlity
- sridhar
- ss7
- sse
- sse-cmm
- ssh
- ssi
- sso
- sspr
- stal
- standard
- starling-connect
- state-sponsored
- state-sponsored-attack
- state-transition
- statistics
- steves
- stolfo
- stoneburner
- stork
- strategy
- strebe
- stubbs
- subramanian
- survey
- sussex
- switzerland
- sybil
- sybil-attack
- synthetic-identity
- sysadmin
- system
- system-administration
- system-administrator
- systems-security-engineering
- systems-security-engineering-capability-maturity-model
- system-z
-
T
- tarala
- taxonomy
- tco
- tco-bibliographic-entry
- technical-documentation
- technical-report
- technical-standard
- technology
- techvision-research
- teiken
- teixeira
- telecommuting
- telesca
- tembo
- template
- tensor
- thakur
- theofanos
- the-open-group
- thesis
- the-sovrin-foundation
- threat
- threat-analysis
- threat-intelligence
- threat-landscape
- threat-modeling
- threat-taxonomy
- tilborg
- tipton
- tishukova
- tobin
- toda
- todd
- todorov
- token-agnostic-identity-propagation
- tonge
- top-down
- total-cost-of-ownership
- toxic-combinations
- tranquility
- tranquility-principle
- tranquility-property
- transfer
- transition
- treharne
- trickbot
- trust
- trustbus
- trusted-third-party
- trust-model
- trzeciak
- tsantes
- ttp
- tyks
- typology
-
U-V
- ubisecure
- ueba
- ulabel
- u-label
- unauthorized-access
- university
- unix
- ura97
- usability
- usable
- user-and-entity-behavior-analytics
- user-authentication
- username
- us-government
- us-secret-service
- valid-account
- validation
- van-looy
- vc
- velasquez
- velez
- vendor
- verifiable-claim
- verifiable-credential
- verificable-claims-working-group
- verified-market-research
- verizon
- video
- virtual-perimeter
- virtual-private-network
- vittori
- voice
- volexity
- vpn
- vulnerability
-
W-Y
- w3c
- waad
- wahl
- wald
- wallet
- walunj
- wang
- watt
- watters
- wayne
- wdigest
- weakness
- web-authentication
- webb
- web-page
- web-services
- web-site
- wef
- wei
- whalen
- whaley
- wheatman
- white-paper
- wid
- wieringa
- wiki
- will-iam
- windley
- window-of-vulnerability
- windows
- wireless
- women
- wonham
- workforce-joiner
- workforce-joiner-process
- workforce-leaver
- workforce-leaver-process
- workforce-mover
- workforce-mover-process
- work-from-home
- working-group
- worm
- wright
- wso2
- wu
- wylie
- xacml
- x-force
- xiang
- xu
- xue
- yang
- yikun
- yitao
- young
- yu
- yung
-
Z
-
0-9
- 1970
- 1971
- 1972
- 1973
- 1974
- 1975
- 1976
- 1977
- 1978
- 1979
- 1980
- 1981
- 1982
- 1983
- 1984
- 1985
- 1986
- 1987
- 1988
- 1989
- 1990
- 1991
- 1992
- 1993
- 1994
- 1995
- 1996
- 1997
- 1998
- 1999
- 2000
- 2001
- 2002
- 2003
- 2004
- 2005
- 2006
- 2007
- 2008
- 2009
- 2010
- 2011
- 2012
- 2013
- 2014
- 2015
- 2016
- 2017
- 2018
- 2019
- 2020
- 2021
- 2022
- 2726
- 2828
- 2fa
- 2-sorted-rbac
- 4ep
- 4-eyes-principle
- 978-0-470-74115-3
Follow us on LinkedIn | Discuss on Slack | Support us with Patreon | Sign-up for a free membership.
This wiki is owned by Open Measure, a non-profit association. The original content we publish is licensed under a Creative Commons Attribution 4.0 International License.