Identity Management

2008 ◽  
pp. 2641-2649
Author(s):  
Katherine M. Hollis ◽  
David M. Hollis

This chapter provides an introductory overview of identity management as it relates to data networking and enterprise information management systems. It looks at the strategic value of identity management in corporate and government environments. It defines the terms, concepts, and technologies associated with identity management. This chapter is a capstone to other chapters that deal with the specific technologies (strong identification and authentication, PKI, encryption, LDAP, etc…). Federated identity management is a strategic concept that encapsulates and integrates these disparate technologies into a coordinated, comprehensive strategy to accomplish enterprise-wide goals. This chapter introduces some practical business case concepts to assists the reader in putting together their own identity management strategies using ROI and success criteria.

Author(s):  
Katherine M. Hollis ◽  
David M. Hollis

This chapter provides an introductory overview of identity management as it relates to data networking and enterprise information management systems. It looks at the strategic value of identity management in corporate and government environments. It defines the terms, concepts, and technologies associated with identity management. This chapter is a capstone to other chapters that deal with the specific technologies (strong identification and authentication, PKI, encryption, LDAP, etc…). Federated identity management is a strategic concept that encapsulates and integrates these disparate technologies into a coordinated, comprehensive strategy to accomplish enterprise-wide goals. This chapter introduces some practical business case concepts to assists the reader in putting together their own identity management strategies using ROI and success criteria.


2010 ◽  
Vol 26-28 ◽  
pp. 457-461
Author(s):  
Min Peng ◽  
Jun Tang

This paper describes the basic theory of SOA architecture and the related technologies to achieve SOA, presents a simplified information system architecture design based on SOA architecture, one by one analyzes the function of each layer, and in detail designs the object-oriented layer, SOA service bus, finally analyzes the SOA application in enterprise information management systems and its prospect.


Author(s):  
Serenella Carota ◽  
Flavio Corradini ◽  
Damiano Falcioni ◽  
Maria Laura Maggiulli ◽  
Fausto Marcantoni ◽  
...  

Author(s):  
Kijpokin Kasemsap

This chapter explains the overview of Intelligent Decision Support Systems (IDSSs); the overview of Enterprise Information Management (EIM); the IDSS techniques for EIM in terms of Expert System (ES), Multi-Agent System (MAS), Fuzzy Logic (FL), Artificial Neural Network (ANN), Evolutionary Computation (EC), and Hybrid System (HS); and the multifaceted applications of IDSSs in EIM. IDSS techniques are rapidly emerging as the modern tools in information management systems and include various techniques, such as ES, MAS, FL, ANN, EC, and HS. IDSS techniques can increase the sensitiveness, flexibility, and accuracy of information management systems. IDSS techniques should be implemented in modern enterprise in order to gain the benefits of using the decision-making process concerning EIM. The chapter argues that utilizing IDSS techniques for EIM has the potential to increase organizational performance and reach strategic goals in global operations.


Sign in / Sign up

Export Citation Format

Share Document