Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
5Activity

Table Of Contents

Executive Summary
Introduction
Key Concepts
Business Value of Identity Management
Identity Management as a Business Control – The Security Perspective
Key Actors and their Roles
Identity Management – The Personal Perspective
Identity Management – The Technical Perspective
Identity Management – The Legal Perspective
Possible Next Steps
Appendix A: Example Risk Assessment Methodology
Appendix B: Additional Business Scenarios for Identity & Access Management
Appendix C: Example of a Trust Model
List of Tables
Index
0 of .
Results for:
No results containing your search query
P. 1
identity management - togaf

identity management - togaf

Ratings: (0)|Views: 346 |Likes:
Published by Mohd Izzat Ismail

More info:

Published by: Mohd Izzat Ismail on Feb 28, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

11/11/2012

pdf

text

original

You're Reading a Free Preview
Pages 4 to 51 are not shown in this preview.
You're Reading a Free Preview
Pages 55 to 65 are not shown in this preview.
You're Reading a Free Preview
Pages 69 to 107 are not shown in this preview.

Activity (5)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
sarsokasaag liked this
Acharya liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->