A Survey of Contemporary Identity and Access Management Architectures

A Survey of Contemporary Identity and Access Management Architectures

DOI: 10.4018/978-1-5225-4828-7.ch005

Abstract

This chapter provides a summary of a number of organisations which are active in IAM researches. The technological and application contributions from each of the IAM contributing organisations, their key deliverables and the active research areas are discussed with the sole purpose in enlightening the knowledge base of the readers.
Chapter Preview
Top

Introduction

This chapter is one of the core contributions to the IAM industry offered by the author. The author has spent great effort in studying the technical architectures of a number of contemporary IAM solutions. This chapter will discuss the technological and application contributions for each of the organisations, their key deliverables and the active areas. The author has identified over 20 public and private institutions in different countries which are active contributors in the area of Identity and Access Management. In particular, we’ll look into some initiatives that have been established with the primary goal of eliminating passwords. Some of the examples are Microsoft's Cardspace, the Higgins project, the Liberty Alliance, NSTIC, the FIDO Alliance and various Identity 2.0 proposals.

Complete Chapter List

Search this Book:
Reset