LEADER 03065nam 2200637 450 001 9910458895803321 005 20200520144314.0 010 $a1-60807-040-9 035 $a(CKB)2670000000066084 035 $a(EBL)634511 035 $a(OCoLC)699475215 035 $a(SSID)ssj0000470173 035 $a(PQKBManifestationID)11321140 035 $a(PQKBTitleCode)TC0000470173 035 $a(PQKBWorkID)10410636 035 $a(PQKB)11764535 035 $a(MiAaPQ)EBC634511 035 $a(Au-PeEL)EBL634511 035 $a(CaPaEBR)ebr10440688 035 $a(CaBNVSL)mat09100140 035 $a(IEEE)9100140 035 $a(EXLCZ)992670000000066084 100 $a20200729d2010 uy 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aIdentity Management $econcepts, technologies, and systems /$fElisa Bertino, Kenji Takahashi 210 1$aBoston, Massachusetts ;$cArtech House,$d2010. 210 2$a[Piscataqay, New Jersey] :$cIEEE Xplore,$d[2010] 215 $a1 online resource (198 p.) 225 1 $aInformation security and privacy series 300 $aDescription based upon print version of record. 311 $a1-60807-039-5 320 $aIncludes bibliographical references and index. 327 $a1. Introduction -- 2. What Is Identity Management? -- 2.1 Stakeholders and Their Requirements -- 2.2 Identity Life Cycle -- 2.3 Identity Assurance -- References -- 3. Fundamental Technologies andProcesses -- 330 $a"Digital identity can be defined as the digital representation of the information known about a specific individual or organization. Digital identity management technology is an essential function in customizing and enhancing the network user experience, protecting privacy, underpinning accountability in transactions and interactions, and complying with regulatory controls. This practical resource offers you a in-depth understanding of how to design, deploy and assess identity management solutions. It provides a comprehensive overview of current trends and future directions in identity management, including best practices, the standardization landscape, and the latest research finding. Additionally, you get a clear explanation of fundamental notions and techniques that cover the entire identity lifecycle"--EBL. 410 0$aArtech House information security and privacy series. 606 $aComputer networks$xSecurity measures 606 $aComputer security 606 $aBusiness enterprises$xComputer networks$xSecurity measures 608 $aElectronic books. 615 0$aComputer networks$xSecurity measures. 615 0$aComputer security. 615 0$aBusiness enterprises$xComputer networks$xSecurity measures. 676 $a005.8 700 $aBertino$b Elisa$0754415 701 $aTakahashi$b Kenji$01026281 801 0$bCaBNVSL 801 1$bCaBNVSL 801 2$bCaBNVSL 906 $aBOOK 912 $a9910458895803321 996 $aIdentity Management$92441125 997 $aUNINA