2008
DOI: 10.1109/mpot.2008.929295
|View full text |Cite
|
Sign up to set email alerts
|

Identity management systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0
1

Year Published

2011
2011
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 0 publications
0
5
0
1
Order By: Relevance
“…It encompasses provisioning and de-provisioning identities, identity authentication, and authorization to a user to access services. In a nutshell, the main goal of identity and access management is to ensure that only authenticated users have access to specific services [40]. Figure 3 helps to give a complete overview of the identity and access management topics that we will address in this survey.…”
Section: The State-of-the-art In Identity and Access Managementmentioning
confidence: 99%
“…It encompasses provisioning and de-provisioning identities, identity authentication, and authorization to a user to access services. In a nutshell, the main goal of identity and access management is to ensure that only authenticated users have access to specific services [40]. Figure 3 helps to give a complete overview of the identity and access management topics that we will address in this survey.…”
Section: The State-of-the-art In Identity and Access Managementmentioning
confidence: 99%
“…Along with this development, there is a continuously increasing need for reliable online identity authentication [15]. Identity management systems (IMSs) are designed to help manage users identities across multiple systems and services by providing authentication, together with identification and authorization [16], [17]. Two larger classes of IMSs exist that are either centralized or decentralized.…”
Section: Identity Management Systemsmentioning
confidence: 99%
“…During these last decades, Identity Management Systems (IdM) [1] have been studied and developed for managing users' identifiers across systems. IdM have inherent flawns and complexities [2].…”
Section: Introductionmentioning
confidence: 99%