Skip to search formSkip to main contentSkip to account menu

Identity intelligence

In computer science, Identity Intelligence is the application, within the Identity Management field, of analytical techniques typical of business… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
........................................................................................................................................................ 3 Introduction.................................................................................................................................................... 4 The Solution: Identity Intelligence ................................................................................................................. 6 What is Identity Intelligence? ..................................................................................................................... 6 Traditional Strategies for IAM .................................................................................................................... 6 Using Point Solutions .............................................................................................................................................. 6 Using an IAM Framework........................................................................................................................................ 7 A Unified and Intelligent Approach to IAM ................................................................................................. 7 Key Features of a Unified and Intelligent Approach to IAM ..................................................................................... 7 An Illustration .......................................................................................................................................................... 8 Using a Unified and Intelligent Approach to IAM ..................................................................................................... 8 Provisioning ................................................................................................................................................. 10 Challenges of Traditional Provisioning .................................................................................................... 10 A Unified and Intelligent Approach to Provisioning .................................................................................. 11 Single Sign-on ............................................................................................................................................. 13 Types of SSO Solutions ........................................................................................................................... 13 Comparing the SSO Approaches .......................................................................................................................... 14 True SSO .............................................................................................................................................................. 15 The Best Option: a Blended Approach .................................................................................................... 15 Role Management ....................................................................................................................................... 17 Using Custom Business Logic as a Workaround .................................................................................... 18 A Unified and Intelligent Approach to Role Management ........................................................................ 18 Multifactor Authentication ............................................................................................................................ 20 A Unified and Intelligent Approach to Multifactor Authentication ............................................................. 20 Password Management .............................................................................................................................. 22 One Option: Self-Service Password Management .................................................................................. 22 A Unified and Intelligent Approach to Password Management ............................................................... 22 Privileged Account Management ................................................................................................................ 24 A Unified and Intelligent Approach to Privileged Account Management ................................................. 24 What if I Already Have an IAM Framework? ............................................................................................... 26 Conclusion................................................................................................................................................... 28 
2009
2009
Abstract : In the business world, it is common knowledge that superior information technology (IT) can lead to competitive… 
Review
2007
Review
2007
The most common definition of bullying is based on Olweus’s (1991, 1993) definition, which states that ‘‘A person is being…