/
Everett, 2011
Everett, 2011
Identity and Access Management: the second wave
Type
Article
Year
2011
Authors
Everett, C.
Identifiers
Publication
Computer Fraud & Security, Volume 2011, Issue 5
Pages
11-13
Abstract
Many regulated organisations are now starting to activate a second wave of
Identity and Access Management (IAM) initiatives as they attempt to rectify the
mistakes made in the first attempt.
(Everett, 2011, p. 1)
Links
Citation
Everett, C., 2011. Identity and Access Management: the second wave. Computer Fraud & Security 2011, 11–13. https://doi.org/10.1016/S1361-3723(11)70051-3
Related content
Part 02 - Identity and Organisational Transformation (Trigoso, 2013)
Part 02 - Identity and Organisational Transformation (Trigoso, 2013)
More like this
Milgate, 2006
Milgate, 2006
More like this
Uddin and Preston, 2015
Uddin and Preston, 2015
More like this
Perkins and Ant, 2005
Perkins and Ant, 2005
More like this
Hurakadli and Sridhar, 2012
Hurakadli and Sridhar, 2012
More like this
Blokdyk, 2019b
Blokdyk, 2019b
More like this
Follow us on LinkedIn | Discuss on Slack | Support us with Patreon | Sign-up for a free membership.
This wiki is owned by Open Measure, a non-profit association. The original content we publish is licensed under a Creative Commons Attribution 4.0 International License.