Everett, 2011

Identity and Access Management: the second wave

Type

Article

Year

2011

Authors

Everett, C.

Publication

Computer Fraud & Security, Volume 2011, Issue 5

Pages

11-13

Abstract

Many regulated organisations are now starting to activate a second wave of
Identity and Access Management (IAM) initiatives as they attempt to rectify the
mistakes made in the first attempt.

(https://open-measure.atlassian.net/wiki/spaces/BIB/pages/1450704897, p. 1)

Citation

Everett, C., 2011. Identity and Access Management: the second wave. Computer Fraud & Security 2011, 11–13. https://doi.org/10.1016/S1361-3723(11)70051-3


Follow us on LinkedIn | Discuss on Slack | Support us with Patreon | Sign-up for a free membership.


This wiki is owned by Open Measure, a non-profit association. The original content we publish is licensed under a Creative Commons Attribution 4.0 International License.