EIdM: Concepts, Technologies, and Application Fields
Denis Royer
Additional contact information
Denis Royer: Goethe University Frankfurt am Main
Chapter Chapter 3 in Enterprise Identity Management, 2013, pp 27-56 from Springer
Abstract:
Abstract EIdM is one of the major challenges for organisations in the coming years. This is due to the fact that more and more access control-related identity data is processed and needs to be handled in an appropriate way. At the technological level, a variety of technologies that belong to the cluster of (E)IdM technologies can be identified. Among others, these include single-sign-on solutions, directory services, public-key infrastructures (PKI), and identity and access management systems (IAM).
Keywords: Identity Management; Account Management; Enterprise Architecture; Expert Interview; Relevant Stakeholder (search for similar items in EconPapers)
Date: 2013
References: Add references at CitEc
Citations: View citations in EconPapers (1)
There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:prochp:978-3-642-35040-5_3
Ordering information: This item can be ordered from
http://www.springer.com/9783642350405
DOI: 10.1007/978-3-642-35040-5_3
Access Statistics for this chapter
More chapters in Progress in IS from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().