Abstract—Recent data breaches caused by highly-privileged insiders (e.g. the NSA/Snowden case) as well as the prolifer-ation of mobile and cloud applications in enterprises imposes new challenges for Identity Management. To cope with these challenges, business analysts have predicted a variety of trends for enterprise Identity Management. In this paper, we conduct a thorough literature analysis to examine to which extent the scientific community seizes upon these trends and identify major research areas therein. Results show that despite the analysts’ predictions, research stagnates for attribute-based access control and privileged user management, while for cloud-based IdM and bring your own device it corresponds to the analysts ’ forecast...
To avoid insider computer misuse, identity, and authorization data referring to the legitimate users...
Every person has his/her own identity. It’s important to manage a digital identity in a computer net...
Copyright © 2014 Ardi BENUSI. This is an open access article distributed under the Creative Commons ...
Abstract.Identity management (IdM) is the complex and constantly evolving practice of identifying in...
Although sophisticated identity management (IdM) technologies have been developed for quite a while,...
Digital identity and access management (IAM) poses significant challenges for companies. Cyberattack...
This case study describes the adoption of an enterprise identity management(IdM) system in an insura...
peer reviewedDigital identity and access management (IAM) poses significant challenges for companies...
Identity and access management is rapidly becoming the top business issue as organizations look to i...
The automotive industry forms a complex network of original equipment manufacturers and suppliers th...
This paper is a systematic review of Identity Access Management (IAM) in information security. Ident...
This paper is a systematic review of Identity Access Management (IAM) in information security. Ident...
Enterprises are faced with the challenges of managing users’ identity across multiple systems and ap...
Identity management is a wide area that deals with identifying individuals or entities in a system (...
Every person has his/her own identity. It’s important to manage a digital identity in a computer net...
To avoid insider computer misuse, identity, and authorization data referring to the legitimate users...
Every person has his/her own identity. It’s important to manage a digital identity in a computer net...
Copyright © 2014 Ardi BENUSI. This is an open access article distributed under the Creative Commons ...
Abstract.Identity management (IdM) is the complex and constantly evolving practice of identifying in...
Although sophisticated identity management (IdM) technologies have been developed for quite a while,...
Digital identity and access management (IAM) poses significant challenges for companies. Cyberattack...
This case study describes the adoption of an enterprise identity management(IdM) system in an insura...
peer reviewedDigital identity and access management (IAM) poses significant challenges for companies...
Identity and access management is rapidly becoming the top business issue as organizations look to i...
The automotive industry forms a complex network of original equipment manufacturers and suppliers th...
This paper is a systematic review of Identity Access Management (IAM) in information security. Ident...
This paper is a systematic review of Identity Access Management (IAM) in information security. Ident...
Enterprises are faced with the challenges of managing users’ identity across multiple systems and ap...
Identity management is a wide area that deals with identifying individuals or entities in a system (...
Every person has his/her own identity. It’s important to manage a digital identity in a computer net...
To avoid insider computer misuse, identity, and authorization data referring to the legitimate users...
Every person has his/her own identity. It’s important to manage a digital identity in a computer net...
Copyright © 2014 Ardi BENUSI. This is an open access article distributed under the Creative Commons ...