skip to content
Digital identity Preview this item
ClosePreview this item
Checking...

Digital identity

Author: Phillip J Windley
Publisher: Beijing ; Sebastopol, CA : O'Reilly, ©2005.
Edition/Format:   Print book : English : 1st edView all editions and formats
Summary:
"The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopted a siege mentality, building walls to keep the bad guys out. It  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Document Type: Book
All Authors / Contributors: Phillip J Windley
ISBN: 0596008783 9780596008789
OCLC Number: 61266094
Notes: Includes index.
"Unmasking Identity Management Architecture (IMA)"--Cover.
Description: xviii, 234 : illustrations ; 24 cm
Contents: Ch 1 Introduction --
Ch 2 Defining Digital Identity --
Ch 3 Trust --
Ch 4 Privacy and Identity --
Ch 5 The Digital Identity --
Ch 6 Integrity, Non-Repudiation, and Confidentiality --
Ch 7 Authentication --
Ch 8 Access Control --
Ch 9 Names and Directories --
Ch 10 Digital Rights Management --
Ch 11 Interoperability Standards --
Ch 12 Federating Identity Ch 13 An Architecture for Digital Identity --
Ch 14 Governance and Business Modeling --
Ch 15 Identity Maturity Models and Process --
Ch 16 Identity Data Architectures --
Ch 17 Interoperability Frameworks for Identity --
Ch 18 Identity Policies --
Ch 19 Identity Management refernce Architectures --
Ch 20 Building an Identity Management Architecture.
Responsibility: Phillip J. Windley.
More information:

Abstract:

"The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopted a siege mentality, building walls to keep the bad guys out. It makes for a secure perimeter, but hampers the flow of commerce."--Back cover.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Related Subjects:(2)

User lists with this item (3)

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/61266094> # Digital identity
    a schema:CreativeWork, schema:Book ;
   library:oclcnum "61266094" ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/47345776#Place/beijing> ; # Beijing
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/cau> ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/47345776#Place/sebastopol_ca> ; # Sebastopol, CA
   schema:about <http://id.loc.gov/authorities/subjects/sh94001277> ; # Computer networks--Security measures
   schema:about <http://id.worldcat.org/fast/872341> ; # Computer networks--Security measures
   schema:about <http://experiment.worldcat.org/entity/work/data/47345776#Topic/reseaux_d_ordinateurs_securite_mesures> ; # Réseaux d'ordinateurs--Sécurité--Mesures
   schema:about <http://dewey.info/class/005.8/e22/> ;
   schema:about <http://experiment.worldcat.org/entity/work/data/47345776#Topic/redes_de_computadoras_medidas_de_seguridad> ; # Redes de computadoras--Medidas de seguridad
   schema:bookEdition "1st ed." ;
   schema:bookFormat bgn:PrintBook ;
   schema:copyrightYear "2005" ;
   schema:creator <http://viaf.org/viaf/28781627> ; # Phillip J. Windley
   schema:datePublished "2005" ;
   schema:description "Ch 1 Introduction -- Ch 2 Defining Digital Identity -- Ch 3 Trust -- Ch 4 Privacy and Identity -- Ch 5 The Digital Identity -- Ch 6 Integrity, Non-Repudiation, and Confidentiality -- Ch 7 Authentication -- Ch 8 Access Control -- Ch 9 Names and Directories -- Ch 10 Digital Rights Management -- Ch 11 Interoperability Standards -- Ch 12 Federating Identity Ch 13 An Architecture for Digital Identity -- Ch 14 Governance and Business Modeling -- Ch 15 Identity Maturity Models and Process -- Ch 16 Identity Data Architectures -- Ch 17 Interoperability Frameworks for Identity -- Ch 18 Identity Policies -- Ch 19 Identity Management refernce Architectures -- Ch 20 Building an Identity Management Architecture."@en ;
   schema:description ""The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopted a siege mentality, building walls to keep the bad guys out. It makes for a secure perimeter, but hampers the flow of commerce."--Back cover."@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/47345776> ;
   schema:inLanguage "en" ;
   schema:name "Digital identity"@en ;
   schema:productID "61266094" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/61266094#PublicationEvent/beijing_sebastopol_ca_o_reilly_2005> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/47345776#Agent/o_reilly> ; # O'Reilly
   schema:workExample <http://worldcat.org/isbn/9780596008789> ;
   umbel:isLike <http://bnb.data.bl.uk/id/resource/GBA713276> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/61266094> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/47345776#Topic/redes_de_computadoras_medidas_de_seguridad> # Redes de computadoras--Medidas de seguridad
    a schema:Intangible ;
   schema:name "Redes de computadoras--Medidas de seguridad"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/47345776#Topic/reseaux_d_ordinateurs_securite_mesures> # Réseaux d'ordinateurs--Sécurité--Mesures
    a schema:Intangible ;
   schema:name "Réseaux d'ordinateurs--Sécurité--Mesures"@fr ;
    .

<http://id.loc.gov/authorities/subjects/sh94001277> # Computer networks--Security measures
    a schema:Intangible ;
   schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872341> # Computer networks--Security measures
    a schema:Intangible ;
   schema:name "Computer networks--Security measures"@en ;
    .

<http://viaf.org/viaf/28781627> # Phillip J. Windley
    a schema:Person ;
   schema:birthDate "1958" ;
   schema:familyName "Windley" ;
   schema:givenName "Phillip J." ;
   schema:name "Phillip J. Windley" ;
    .

<http://worldcat.org/isbn/9780596008789>
    a schema:ProductModel ;
   schema:isbn "0596008783" ;
   schema:isbn "9780596008789" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.