Advances in Business Information Systems and Analytics - Contemporary Identity and Access Management Architectures
Latest Publications


TOTAL DOCUMENTS

8
(FIVE YEARS 0)

H-INDEX

0
(FIVE YEARS 0)

Published By IGI Global

9781522548287, 9781522548294

This chapter provides a summary of a number of organisations which are active in IAM researches. The technological and application contributions from each of the IAM contributing organisations, their key deliverables and the active research areas are discussed with the sole purpose in enlightening the knowledge base of the readers.


This chapter presents a few scenarios to demonstrate the fact that identity management is employed in many aspects of our daily activities and gives a brief history of Identity and Access Management, showing our readers how the Internet has prompted identity problems. The author will discuss some of the challenges exemplified by some scenarios such as passwords, biometrics, social identity, and identity mobility.


Online identity has become so pivotal to so many different aspects of a person's live and will impact all of us in one way or another. This chapter tries to post some insights to where the Identity and Access Management industry is going. This chapter discusses the future development of IAM in relation to the following new technological trends: Internet of Everything (IoE), Identity Relationship Management, Transient Identities, and Autonomous Devices.


The life cycle management of a person's identity includes the technologies used for provisioning and password resets, the processes and policies associated with different technologies, and the important events that happen around the management issues of a person's identity. This chapter will discuss the entire process in managing the life cycle of identities using scenarios in illustrating how life cycle management is being used in handling the different activities in IAM.


This chapter covers some of the core concept and technological background of IAM with topics such as, definitions of Identity, Identity Management, and different generations of IAM technologies. However, please take note that this chapter will not be providing in depth explanations of each topic because it is beyond the scope of this book.


This chapter exhibits an objective third party evaluation on a number of commercially available IAM solutions, including Microsoft Identity Manager & Microsoft Azure Active Directory, IBM Security Identity Manager and Cloud Identity Service, Okta, Centrify, Ping Identity, Oracle Identity and Access Management, and Salesforce.com. A summary of the functionalities and capabilities exhibited by those commercially available IAM solutions will be presented in this chapter to assist the readers in selecting and evaluating contemporary IAM systems for both the Cloud and on-premises environments.


The Australian Federal Police (https://www.afp.gov.au/what-we-do/crime-types/fraud/identity-crime) report that identity crime has critically threatened the Australian community as this type of crime has generated significant profits for offenders and caused considerable financial losses to the Australian Government, private industry and individuals. Recent estimates by the Attorney-General's Department indicate that identity crime costs Australia upwards of $1.6 billion each year, with the majority (around $900m) lost by individuals through credit card fraud, identity theft and scams. More alarmingly, identity crime continues to be a key enabler of serious and organised crime, which in turn costs Australia around $15 billion annually. This chapter discusses how personal identities can be stolen and exploited and proposes a Self-learning Context Aware Identity Access and Management Framework (SCAIAM) for combating identity theft.


Sign in / Sign up

Export Citation Format

Share Document