This page lists all bibliographic entries linked to the IAM theme.
To link a bibliographic entry to the IAM theme, add the iam-bibliographic-entry
tag to the corresponding page.
-
Aguado et al., 2020 — Aguado Corman, A., Fernández Rodríguez, D., Georgiou, M.V., Rische, J., Schuszter, I.C., Short, H., Tedesco, P., 2020. CERN’s Identity and Access Management: A journey to Open Source. EPJ Web Conf. 245, 03012. CERN’s Identity and Access Management: A journey to Open Source | EPJ Web of Conferences
-
Akamai, 2020 — Akamai, 2020. The Business Case for Single Customer View - Using Customer Data to Enhance Trust, Engagement, Customer Experience, and ROI (White Paper).
-
Alaga and Wan, 2008 — Vasu Alaga, Kaiyu Wan (2008) Context Based Enforcement of Authorization for Privacy and Security in Identity Management. In: de Leeuw E., Fischer-Hübner S., Tseng J., Borking J. (eds) Policies and Research in Identity Management. The International Federation for Information Processing, vol 261. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-77996-6_3
-
Allan and Iverson, 2018 — Allan, A., Iverson, B., 2018. Identity and Access Management Program Primer for 2018 (Gartner Research Note No. G00344302). Gartner.
-
-
-
-
-
-
-
-
-
Beautement et al., 2008 — Beautement, A., Sasse, M.A., Wonham, M., 2008. The Compliance Budget: Managing Security Behaviour in Organisations, in: Proceedings of the 2008 Workshop on New Security Paradigms - NSPW ’08. Presented at the 2008 workshop, ACM Press, Lake Tahoe, California, USA, p. 47. https://doi.org/10.1145/1595676.1595684
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Iverson et al., 2018 — Iverson, B., Kampman, K., Gaehtgens, F., 2018. Critical Capabilities for Identity Governance and Administration (No. G00332371). Gartner.
-
-
-
-
-
-
-
-
Kumar and Shyamasundar, 2017
- multilevel-security
- mls
- 2017
- bibliographic-entry
- iam-bibliographic-entry
- lattice-based-access-control
- lbac
- role-based-access-control
- rbac
- bell-lapadula
- bell-lapadula-model
- blp
- mac
- mandatory-access-control
- access-control
- dac
- discretionary-access-control
- ifc
- rwfm
- readers-writers-flow-model
- information-flow-model
- chinese-wall
- chinese-wall-policy
- shyamasundar
- kumar
- article
-
-
-
-
-
-
-
-
-
-
-
-
-
Manteigueiro et al., 2020 — Manteigueiro, J., Crocker, P., Barrico, C., 2020. Identity Management and Access Control for the GNSS Community within a European Research Infrastructure, in: 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC). Presented at the 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC), IEEE, Madrid, Spain, pp. 1616–1621.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
NIST IR 7983, 2014 — Steves, M., Chisnell, D., Sasse, A., Krol, K., Theofanos, M., Wald, H., 2014. NIST IR 7983: Report: Authentication Diary Study (No. NIST IR 7983). National Institute of Standards and Technology. https://doi.org/10.6028/NIST.IR.7983
-
-
-
-
-
-
-
O’Neill et al., 2020 — O’Neill, G., Pedroli, M., Fravolini, A., Marcon, L., 2020. Business Trends Report - Bring Your Own Identity - CEF eID SMO - Version 1.0 (No. Framework Contract DI/07624-ABC IV Lot 3, ABC IV-000358-6000184687-REQ-01). European Commission.
-
-
-
-
-
-
-
Osmanoglu et al., 2013
- bibliographic-entry
- iam-bibliographic-entry
- book
- 2013
- osmanoglu
- reinhold
- tsantes
- chip
- park
- ritchey
- bresz
- sussex
- gazos
- martin
- brunenmeister
- cowart
- royer
- business-performance
- connected-intelligence
- workforce-mover
- joiner-mover-leaver
- joiner-mover-leaver-process
- workforce-joiner-process
- joiner-process
- mover-process
- mover
- leaver-process
- jml
- workforce-leaver-process
- workforce-mover-process
- joiner
- leaver
-
Osmanoglu, 2013 — Osmanoglu, E., 2013. Current State and Capability Maturity, in: Osmanoglu et al. (2013). Identity and Access Management: Business Performance through Connected Intelligence. Syngress, an Imprint of Elsevier, Amsterdam, [Netherlands]. pp. 55–88.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Royer, 2013 — Royer, D., 2013. Enterprise Identity Management: Towards an Investment Decision Support Approach, Progress in IS. Springer, Heidelberg.
-
-
-
-
-
-
-
-
-
-
-
-
-
Shah et al., 2015 — Shah, Y., Choyi, V., Schmidt, A.U., Subramanian, L., 2015. Multi-factor Authentication as a Service. Presented at the 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, pp. 144–150. https://doi.org/DOI 10.1109/MobileCloud.2015.35
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-