Digital Identity: Unmasking Identity Management Architecture (IMA)
4/5
()
Currently unavailable
Currently unavailable
About this ebook
The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopted a siege mentality, building walls to keep the bad guys out. It makes for a secure perimeter, but hampers the flow of commerce.
Fortunately, some corporations are beginning to rethink how they provide security, so that interactions with customers, employees, partners, and suppliers will be richer and more flexible. Digital Identity explains how to go about it. This book details an important concept known as "identity management architecture" (IMA): a method to provide ample protection while giving good guys access to vital information and systems. In today's service-oriented economy, digital identity is everything. IMA is a coherent, enterprise-wide set of standards, policies, certifications and management activities that enable companies like yours to manage digital identity effectively--not just as a security check, but as a way to extend services and pinpoint the needs of customers.
Author Phil Windley likens IMA to good city planning. Cities define uses and design standards to ensure that buildings and city services are consistent and workable. Within that context, individual buildings--or system architectures--function as part of the overall plan. With Windley's experience as VP of product development for Excite@Home.com and CIO of Governor Michael Leavitt's administration in Utah, he provides a rich, real-world view of the concepts, issues, and technologies behind identity management architecture.
How does digital identity increase business opportunity? Windley's favorite example is the ATM machine. With ATMs, banks can now offer around-the-clock service, serve more customers simultaneously, and do it in a variety of new locations. This fascinating book shows CIOs, other IT professionals, product managers, and programmers how security planning can support business goals and opportunities, rather than holding them at bay.
Phillip J. Windley
Phil Windley is a Principal Engineer in the Office of Information Technology at Brigham Young University. He was the Founding Chair of the Sovrin Foundation, serving from 2016 to 2020. He is also the co-founder and organizer of the Internet Identity Workshop, one of the world’s most important and long-lived identity conferences. Phil writes the popular Technometria blog, and is the author of the books The Live Web (Course Technology, 2011) and Digital Identity (O'Reilly Media, 2005). Phil has served on the Boards of Directors and Advisory Boards for several high-tech companies. Phil has been a professor of Computer Science at Brigham Young University (twice) and the University of Idaho. In addition, Phil was the Founder and Chief Technology Officer of Kynetx, the company behind the open-source connected-car product, Fuse. He also spent two years as the Chief Information Officer (CIO) for the State of Utah in 2001-2002, serving on Governor Mike Leavitt's Cabinet and as a member of his Senior Staff. Before entering public service, Phil was Vice President for Product Development and Operations at Excite@Home. He was the Founder and Chief Technology Officer (CTO) of iMALL, Inc. an early creator of ecommerce tools. Phil received his Ph.D. in Computer Science from University of California, Davis in 1990.
Related to Digital Identity
Related ebooks
Working With Agencies: An Insider's Guide Rating: 0 out of 5 stars0 ratingsEffective Vulnerability Management: Managing Risk in the Vulnerable Digital Ecosystem Rating: 0 out of 5 stars0 ratingsHow to Start and Run an eBay Consignment Business Rating: 0 out of 5 stars0 ratingsIBM Cognos 8 Business Intelligence: The Official Guide Rating: 0 out of 5 stars0 ratingsTurn eBay Data into Dollars Rating: 4 out of 5 stars4/5Interconnecting Smart Objects with IP: The Next Internet Rating: 5 out of 5 stars5/5The Ultimate Small Business Marketing Toolkit: All the Tips, Forms, and Strategies You'll Ever Need! Rating: 3 out of 5 stars3/5Financial Business Intelligence: Trends, Technology, Software Selection, and Implementation Rating: 0 out of 5 stars0 ratingsConvergence: User Expectations, Communications Enablers and Business Opportunities Rating: 0 out of 5 stars0 ratingsMoving To The Cloud: Developing Apps in the New World of Cloud Computing Rating: 3 out of 5 stars3/5The Basics of Cloud Computing: Understanding the Fundamentals of Cloud Computing in Theory and Practice Rating: 0 out of 5 stars0 ratingsDevelopment Research in Practice: The DIME Analytics Data Handbook Rating: 0 out of 5 stars0 ratingsScene of the Cybercrime Rating: 4 out of 5 stars4/5Excel VBA Macro Programming Rating: 0 out of 5 stars0 ratingsHow to Profit in the Stock Market: Short-Term Trading and Investing Strategies for Beginners Rating: 5 out of 5 stars5/5Future Drivers of Growth in Rwanda: Innovation, Integration, Agglomeration, and Competition Rating: 0 out of 5 stars0 ratings3D Printer Projects for Makerspaces Rating: 4 out of 5 stars4/5Web Site Privacy with P3P Rating: 0 out of 5 stars0 ratingsProgramming FPGAs: Getting Started with Verilog Rating: 4 out of 5 stars4/5Mastering Data Warehouse Design: Relational and Dimensional Techniques Rating: 4 out of 5 stars4/5Open Source Fuzzing Tools Rating: 0 out of 5 stars0 ratingsProgramming Arduino: Getting Started with Sketches, Third Edition Rating: 0 out of 5 stars0 ratingsThe Boston Institute of Finance Mutual Fund Advisor Course: Series 6 and Series 63 Test Prep Rating: 0 out of 5 stars0 ratingsSecuring Windows Server 2008: Prevent Attacks from Outside and Inside Your Organization Rating: 0 out of 5 stars0 ratingsModern Embedded Computing: Designing Connected, Pervasive, Media-Rich Systems Rating: 5 out of 5 stars5/5Your First Sailboat, Second Edition Rating: 3 out of 5 stars3/5Microsoft SQL Server 2005: A Beginner''s Guide Rating: 0 out of 5 stars0 ratingsSecurity for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts Rating: 4 out of 5 stars4/5The Strategy Gap: Leveraging Technology to Execute Winning Strategies Rating: 0 out of 5 stars0 ratingsThe Crafty Kids Guide to DIY Electronics: 20 Fun Projects for Makers, Crafters, and Everyone in Between Rating: 0 out of 5 stars0 ratings
Computers For You
Slenderman: Online Obsession, Mental Illness, and the Violent Crime of Two Midwestern Girls Rating: 4 out of 5 stars4/5Elon Musk Rating: 4 out of 5 stars4/5SQL QuickStart Guide: The Simplified Beginner's Guide to Managing, Analyzing, and Manipulating Data With SQL Rating: 4 out of 5 stars4/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5101 Awesome Builds: Minecraft® Secrets from the World's Greatest Crafters Rating: 4 out of 5 stars4/5Standard Deviations: Flawed Assumptions, Tortured Data, and Other Ways to Lie with Statistics Rating: 4 out of 5 stars4/5The Invisible Rainbow: A History of Electricity and Life Rating: 4 out of 5 stars4/5Mastering ChatGPT: 21 Prompts Templates for Effortless Writing Rating: 5 out of 5 stars5/5Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5CompTIA IT Fundamentals (ITF+) Study Guide: Exam FC0-U61 Rating: 0 out of 5 stars0 ratingsThe ChatGPT Millionaire Handbook: Make Money Online With the Power of AI Technology Rating: 0 out of 5 stars0 ratingsProcreate for Beginners: Introduction to Procreate for Drawing and Illustrating on the iPad Rating: 0 out of 5 stars0 ratingsAlan Turing: The Enigma: The Book That Inspired the Film The Imitation Game - Updated Edition Rating: 4 out of 5 stars4/5CompTIA Security+ Practice Questions Rating: 2 out of 5 stars2/5Childhood Unplugged: Practical Advice to Get Kids Off Screens and Find Balance Rating: 0 out of 5 stars0 ratingsGrokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5Creating Online Courses with ChatGPT | A Step-by-Step Guide with Prompt Templates Rating: 4 out of 5 stars4/5Dark Aeon: Transhumanism and the War Against Humanity Rating: 5 out of 5 stars5/5AP Computer Science Principles Premium, 2024: 6 Practice Tests + Comprehensive Review + Online Practice Rating: 0 out of 5 stars0 ratingsChatGPT Ultimate User Guide - How to Make Money Online Faster and More Precise Using AI Technology Rating: 0 out of 5 stars0 ratingsThe Professional Voiceover Handbook: Voiceover training, #1 Rating: 5 out of 5 stars5/5Going Text: Mastering the Command Line Rating: 4 out of 5 stars4/5People Skills for Analytical Thinkers Rating: 5 out of 5 stars5/5How to Create Cpn Numbers the Right way: A Step by Step Guide to Creating cpn Numbers Legally Rating: 4 out of 5 stars4/5
Reviews for Digital Identity
7 ratings0 reviews