Everett, 2011
Identity and Access Management: the second wave
Type
Article
Year
2011
Authors
Everett, C.
Identifiers
Publication
Computer Fraud & Security, Volume 2011, Issue 5
Pages
11-13
Abstract
Many regulated organisations are now starting to activate a second wave of
Identity and Access Management (IAM) initiatives as they attempt to rectify the
mistakes made in the first attempt.
(Everett, 2011, p. 1)
Links
Citation
Everett, C., 2011. Identity and Access Management: the second wave. Computer Fraud & Security 2011, 11–13. https://doi.org/10.1016/S1361-3723(11)70051-3
Follow us on LinkedIn | Discuss on Slack | Support us with Patreon | Sign-up for a free membership.
This wiki is owned by Open Measure, a non-profit association. The original content we publish is licensed under a Creative Commons Attribution 4.0 International License.