Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,324 papers from all fields of science
Search
Sign In
Create Free Account
Privileged identity management
Privileged identity management (PIM) is a domain within identity management focused on the special requirements of powerful accounts within the IT…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
12 relations
Authentication
Authorization
Data breach
Gene Spafford
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Federated Privileged Identity Management for Break-the-Glass: A Case Study with OpenAM
Davy Preuveneers
,
W. Joosen
European Workshop on Practical Aspects of Health…
2014
Corpus ID: 6255112
As next generation health monitoring and Ambient Assisted Living applications are opening up towards a variety of stakeholders…
Expand
2012
2012
Privileged identity management in enterprise service-hosting environments
K. Bhaskaran
,
Milton Hernandez
,
+10 authors
Gregory Gaskill
IEEE Network Operations and Management Symposium
2012
Corpus ID: 39511539
IAM needs will only grow as devices, servers, and end points continue to increase . Current schemes are not sustainable as the…
Expand
2012
2012
Interview: Philip Lieberman and the human factor
Steve Mansfield-Devine
2012
Corpus ID: 62552953
2010
2010
Privileged identity management: securing the enterprise
Shlomi Dinoor
Network Security
2010
Corpus ID: 25581277
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE