Identity Management

Identity Management

Kumbesan Sandrasegaran, Mo Li
Copyright: © 2008 |Pages: 17
ISBN13: 9781599048994|ISBN10: 159904899X|EISBN13: 9781599049007
DOI: 10.4018/978-1-59904-899-4.ch004
Cite Chapter Cite Chapter

MLA

Sandrasegaran, Kumbesan, and Mo Li. "Identity Management." Handbook of Research on Wireless Security, edited by Yan Zhang, et al., IGI Global, 2008, pp. 44-60. https://doi.org/10.4018/978-1-59904-899-4.ch004

APA

Sandrasegaran, K. & Li, M. (2008). Identity Management. In Y. Zhang, J. Zheng, & M. Ma (Eds.), Handbook of Research on Wireless Security (pp. 44-60). IGI Global. https://doi.org/10.4018/978-1-59904-899-4.ch004

Chicago

Sandrasegaran, Kumbesan, and Mo Li. "Identity Management." In Handbook of Research on Wireless Security, edited by Yan Zhang, Jun Zheng, and Miao Ma, 44-60. Hershey, PA: IGI Global, 2008. https://doi.org/10.4018/978-1-59904-899-4.ch004

Export Reference

Mendeley
Favorite

Abstract

The broad aim of identity management (IdM) is to manage the resources of an organization (such as files, records, data, and communication infrastructure and services) and to control and manage access to those resources in an efficient and accurate way. Consequently, identity management is both a technical and process-orientated concept. The concept of IdM has begun to be applied in identities-related applications in enterprises, governments, and Web services since 2002. As the integration of heterogeneous wireless networks becomes a key issue in towards the next generation (NG) networks, IdM will be crucial to the success of NG wireless networks. A number of issues, such as mobility management, multi-provider and securities require the corresponding solutions in terms of user authentication, access control, and so forth. IdM in NG wireless networks is about managing the digital identity of a user and ensuring that users have fast, reliable, and secure access to distributed resources and services of an next generation network (NGN) and the associated service providers, across multiple systems and business contexts.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.