Assessing identity and access management systems based on domain-specific performance evaluation

Author(s):  
Frank Schell ◽  
Andreas Schaf ◽  
Jochen Dinger ◽  
Hannes Hartenstein
2005 ◽  
Vol 07 (03) ◽  
pp. 433-456 ◽  
Author(s):  
KRISTINA LUNDBERG ◽  
BERIT BALFORS ◽  
LENNART FOLKESON

Environmental management systems (EMS) require performance evaluation of significant environmental aspects. Much has been published on how to achieve environmental performance evaluation but little information is available on applications in practice. The Swedish National Rail Administration, Banverket, initiated the implementation of EMS in 1998, at about the same time as many other rail administrations. In this paper an overview of the application of EMS at rail administrations in selected countries is presented and systems for environmental performance evaluation within the EMS used by Banverket are analysed. The use of EMS by rail administrations was found to vary from the absence of environmental management to fully implemented EMS, mainly ISO 14001. At Banverket, EMS is widely used but the environmental performance evaluation could be improved by introducing indicators and merging all types of environmental monitoring, currently reported separately, into a common system.


Author(s):  
Andreas Pashalidis ◽  
Chris J. Mitchell

This chapter surveys the approaches for addressing privacy in open identity and access management systems that have been taken by a number of current systems. The chapter begins by listing important privacy requirements and discusses how three systems that are being incrementally deployed in the Internet, namely SAML 2.0, CardSpace, and eID, address these requirements. Subsequently, the findings of recent European research projects in the area of privacy for I&AM systems are discussed. Finally, the approach taken to address the identified privacy requirements by ongoing projects is described at a high level. The overall goal of this chapter is to provide the reader with an overview of the diversity of privacy issues and techniques in the context of I&AM.


Sign in / Sign up

Export Citation Format

Share Document