1 / 198
文档名称:

Artech.House-Identity.Management.Concepts.Technologies.and.Systems.2011.RETAiL.EBook-DiGiBook.pdf

格式:pdf   页数:198
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

Artech.House-Identity.Management.Concepts.Technologies.and.Systems.2011.RETAiL.EBook-DiGiBook.pdf

上传人:kuo08091 2014/5/25 文件大小:0 KB

下载得到文件列表

Artech.House-Identity.Management.Concepts.Technologies.and.Systems.2011.RETAiL.EBook-DiGiBook.pdf

文档介绍

文档介绍:Identity Management
Concepts, Technologies, and Systems
For plete listing of titles in the
Artech House Information Security and Privacy Series,
turn to the back of this book.
Identity Management
Concepts, Technologies, and Systems
Elisa Bertino
Kenji Takahashi
Library of Congress Cataloging-in-Publication Data
A catalog record for this book is available from the . Library of Congress.
British Library Cataloguing in Publication Data
A catalogue record for this book is available from the British Library.
Cover design by Vicki Kane
ISBN 13: 978-1-60807-039-8
© 2011 ARTECH HOUSE
685 Canton Street
Norwood, MA 02062
All rights reserved. Printed and bound in the United States of America. No part of this book
may be reproduced or utilized in any form or by any means, electronic or mechanical, includ-
ing photocopying, recording, or by any information storage and retrieval system, without
permission in writing from the publisher.
All terms mentioned in this book that are known to be trademarks or service marks have
been appropriately capitalized. Artech House cannot attest to the accuracy of this information.
Use of a term in this book should not be regarded as affecting the validity of any trademark
or service mark.
10 9 8 7 6 5 4 3 2 1
Contents
1 Introduction 11
Stakeholders and Business Opportunities 12
Identity Ecosystem and Key Trends 14
Challenges in Identity Management 18
Overview of This Book 18
References 19
2 What Is Identity Management? 21
Stakeholders and Their Requirements 25
Subjects 25
Identity Providers 27
Relying Parties 27
Control Parties 28
Relationships Between Stakeholders 28
Identity Life Cycle 29
Creation 30
Usage 32
Update 34
5
6 Identity Management: Concepts, Technologies, and Systems
Revocation 35
Governance 36
Identity Assurance 37
References 41
3 Fundamental Technologies an