It is the cache of ${baseHref}. It is a snapshot of the page. The current page could have changed in the meantime.
Tip: To quickly find your search term on this page, press Ctrl+F or ⌘-F (Mac) and use the find bar.

Issues and Emerging Trends in Identity Management | Snehi | INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY

Issues and Emerging Trends in Identity Management

Manish Snehi, Jyoti Snehi, Renu Dhir

Abstract


In today’s digital age as companies are moving more and more amounts of important, sensitive data, information, applications, and infrastructure online there is a need to establish and maintain credentials on all the connected and disconnected systems, and grant rights or access to users. The main goal is to manage physical and logical resources and relate them to owners. Identity Management is emerging as a significant technology to help in handling the complexity of today’s Business companies, dealing with security in the virtualized environment, strong authentication and dealing with threats from Insiders. This paper attempts to provide direction toward some of the issues, Challenges and Trends in Identity Management. Emerging Trends in Information technology involves identity audit, automated compliance, Role lifecycle management, authorization, Information centric identity, E-SSO and strong authentication, Open ID, Infocards, CardSpace, Governance, Identity management as a service, Risk management, and Compliance Modularity.


Keywords


IM (Identity Management); IMS (Identity Management Security); IAM (Identity and Access Management)

Full Text:

PDF

References


. Jamie Lewis, Enterprise Identity Management: It is About Business, Burton Group of Directory and Security Strategy Report, version July 2nd 2003.

. Jason Bloomberg, Zapflash, Enterprise and Identity Management: Essentials of SOA Prerequisite, June 19th, 2003.

. Jonathan Penn,VP & Research Director, Security & Risk Management, Forrester Research,2008,Identity & Access Management: Trends & Best Practices

. Harjeev Dhingra, Identity Management – White Paper, Principal Security Architect, NetCom System

Kahn, Jam. “HIPAA: Critical role of making strong authentication.” Safenet. Apr.2002 [6] Langin, Daniel J. “Gramm-Leach-Bliley Security Requirements: Keeping Robbers and Regulators from the Door.” Jun. 2002. 12 Nov. 2004.

Lewis Jamie. “Emerging Infrastructure for ID&AM”. Open Group in Conference. Jan. 2002. 15 Oct. 2004.

Meta Group. “User Life-Cycle Management?” 800 to 94


Refbacks

  • There are currently no refbacks.




Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

@ 2010 onward COUNCIL FOR INNOVATIVE RESEARCH

All rights reserved with Journal Manager CIR.

To make sure that you can receive messages from us, please add our domain to your e-mail 'safe list'. If you do not receive e-mail in your 'inbox', check your 'bulk mail' or 'junk mail' folders.

For any Technical Support editor@cirworld.com, editorcir@gmail.com