The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopted a siege mentality, building walls to keep the bad guys out. It makes for a secure perimeter, but hampers the flow of commerce. Fortunately, some corporations are beginning to rethink how they provide security, so that interactions with customers, employees, partners, and suppliers will be richer and more flexible. Digital Identity explains how to go about it. This book details an important concept known as "identity management architecture" (IMA): a method to provide ample protection while giving good guys access to vital information and systems. In today's service-oriented economy, digital identity is everything. IMA is a coherent, enterprise-wide set of standards, policies, certifications and management activities that enable companies like yours to manage digital identity effectively--not just as a security check, but as a way to extend services and pinpoint the needs of customers.Author Phil Windley likens IMA to good city planning. Cities define uses and design standards to ensure that buildings and city services are consistent and workable. Within that context, individual buildings--or system architectures--function as part of the overall plan. With Windley's experience as VP of product development for [email protected] and CIO of Governor Michael Leavitt's administration in Utah, he provides a rich, real-world view of the concepts, issues, and technologies behind identity management architecture.How does digital identity increase business opportunity? Windley's favorite example is the ATM machine. With ATMs, banks can now offer around-the-clock service, serve more customers simultaneously, and do it in a variety of new locations. This fascinating book shows CIOs, other IT professionals, product managers, and programmers how security planning can support business goals and opportunities, rather than holding them at bay.
Cited By
- Korać D, Damjanović B and Simić D (2022). A model of digital identity for better information security in e-learning systems, The Journal of Supercomputing, 78:3, (3325-3354), Online publication date: 1-Feb-2022.
- Feher K (2021). Digital identity and the online self, Journal of Information Science, 47:2, (192-205), Online publication date: 1-Apr-2021.
- Puchta A, Böhm F and Pernul G Contributing to Current Challenges in Identity and Access Management with Visual Analytics Data and Applications Security and Privacy XXXIII, (221-239)
- Styliari T, Kefalidou G and Koleva B Cinema-going trajectories in the digital age Proceedings of the 32nd International BCS Human Computer Interaction Conference, (1-12)
- Wahyudi A, Matheus R and Janssen M Benefits and Challenges of a Reference Architecture for Processing Statistical Data Digital Nations – Smart Cities, Innovation, and Sustainability, (462-473)
- Fabian B, Kunz S, MüLler S and GüNther O (2013). Secure federation of semantic information services, Decision Support Systems, 55:1, (385-398), Online publication date: 1-Apr-2013.
- Ayed G and Ghernaouti-Helie S Processes View Modeling of Identity-related Privacy Business Interoperability Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012), (906-913)
- Elabidi A, Ben Ayed G, Mettali Gammar S and Kamoun F Towards hiding federated digital identity Proceedings of the 4th international conference on Security of information and networks, (239-242)
- Al-Sinani H and Mitchell C A universal client-based identity management tool Proceedings of the 8th European conference on Public Key Infrastructures, Services, and Applications, (49-74)
- Rempel P, Katt B and Breu R Supporting role based provisioning with rules using OWL and F-logic Proceedings of the 2010 international conference on On the move to meaningful internet systems - Volume Part I, (600-618)
- Carmagnola F, Osborne F and Torre I User data distributed on the social web Proceedings of the 1st International Workshop on Information Heterogeneity and Fusion in Recommender Systems, (9-15)
- Rowe M The credibility of digital identity information on the social web Proceedings of the 4th workshop on Information credibility, (35-42)
- Thomas I and Meinel C An identity provider to manage reliable digital identities for SOA and the web Proceedings of the 9th Symposium on Identity and Trust on the Internet, (26-36)
- Dąbrowski M and Pacyna P Distributed identity discovery service for non-federated systems Proceedings of the 6th International Conference on Advances in Mobile Computing and Multimedia, (409-413)
- Dabrowski M and Pacyna P Cross-identifier domain discovery service for unrelated user identities Proceedings of the 4th ACM workshop on Digital identity management, (81-88)
- Windley P, Daley D, Cutler B and Tew K Using reputation to augment explicit authorization Proceedings of the 2007 ACM workshop on Digital identity management, (72-81)
- Satchell C, Shanks G, Howard S and Murphy J Beyond security Proceedings of the 18th Australia conference on Computer-Human Interaction: Design: Activities, Artefacts and Environments, (313-316)
- Poursalidis V and Nikolaou C A new user-centric identity management infrastructure for federated systems Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business, (11-20)
Index Terms
- Digital Identity