Enterprise Identity Data Management (EIDM)To propose a multidimensional decision support framework based on a ERP systems and Balanced

Scorecard to design an artifact for developing a decision support instrument for introducing EIDMS
Enterprise identity data management can be found in variety of organizational processes. ERP is the basis for efficient EIDM and this paper propose the EIDM solution on the basis of critical success factors derived through ERP systems and are critical for implementation of EIDM. Enterprise identity data management system, EIDM, ERP implementation, Siemen and ERP, Balance score card, ERP critical success factors. Short teaser without bullet points [English]

1

where organizations have to face various costs for the planning. The Acid Test of Corporate Identity Management might avoid some of the pitfalls which they can face when designing corporate identity change strategies.[3] This paper presents a general model for describing the framework of identity management in cross-border contexts.[1] Research shows that corporate identity strategies are being built around the vision of corporation made by top management.[2] Digital identity provides real world entities the attributes and exchange of data between organizations as data exchange in individual data authorities in a trusted data exchange environment. This paper proposed the initial idea of how valuable will be the introduction of EIDM in an organization on the basis of balance score card approach.1 Introduction [Text] Sir said that we will start our topic with ERP which will be provided by Maryam Noor she will make a matrix which will have CSFs and please tell her to emphasis on CSFs of ERP which relates and give basis for EIDM and then we will link ERP with EIDM and we will talk about EIDM’s CSFs and balance score card approach and our conclusion with a visit to Siemens and this Siemens case study will support our arguments. and which credentials to present in response to authentication or attribute requests. the implementation. and the operation of such systems.[5] 2 . Most of the countries have installed SIM for identification purpose. User-centric identity management systems lets users choose. Methodology used was open ended questionnaire of 17 items. for example. 2 Literature review The introduction of Enterprise Identity Management Systems (EIdMS) in organizations is a costly and challenging endeavor.[4] Single-sign-on systems are popular tools for addressing identity needs: they attempt to unify all accounts and access rights into one system per enterprise against which users can authenticate themselves. what personal data to disclose under various conditions.

based on “what-if” analysis. Practical Very much convenient to use due to only applet calculator(OTP) Give well defined evaluation frame work and justify hybrid role development This is work in progress and need to be tune by customer trials and should be test in real security projects [7] X X Role Engineering and Role Mining is the most promising way for Creating enterprise-wide roles. can explain and predict the impact of specific (policy) choices. [8] X X X illustrated how the outcomes of modeling and simulation activities. Year [6] Evaluation approach based on BSC Finance Business process X Project’s value addition Results Learning & Growth X Customer perspective Relevance & validity to Context (Siemens) Critique Convenience. 1 short figure captions (underneath) 3 . Author.Existing Literature Title. Safety.1 … Fig. from different viewpoints 2.

Towards a Generic Evaluation Approach. 8. 2007. IEEE International Symposium on. Broser. Wild Web. 3. Yan. 5(4): p. L. IEEE. ARES '09. 15(1-3): p. Otjacques. P. A... Soenen. Shiu.M.Tab. 2008.C. HICSS '06. and F. International Conference on. The Acid Test of Corporate Identity Management™. Master.T. WiCOM '08. Networking and Mobile Computing. 2005. in System Sciences. in Availability.. 2008. Feltz. Baldwin.B.. 5. Journal of Marketing Management. Royer. Mont. B. Proceedings of the 39th Annual Hawaii International Conference on. 2008. 5 Summary and Outlook References 1. A. Using Modelling and Simulation for Policy Decision Support in Identity Management. 2009. 32(7): p. 2009. D. and S. and G. Hitzelberger. in Availability. Reliability and Security. J. ARES 08. Third International Conference on. 2. Appendix 4 . Digital Identities Can Tame The Wild.. 2006.. EDPACS. 1999. L. 2008. Different Approaches to In-House Identity Management Justification of an Assumption. but must also be included as separate files (unless they were created with the Word-internal graphics functions). 84-87. Pernul. POLICY 2009. P. User-Centric Identity Management: New Trends in Standardization and Regulation. 6. Research on E-Business Identity Authentication System Based on Improved One-Time Password. Assessing the Value of Enterprise Identity Management (EIdM) &#150. Balmer. in Policies for Distributed Systems and Networks. Bramhall. Fuchs. et al. and G. Reliability and Security. 2009. in Wireless Communications. 1 short table headings Figures may be embedded in the Word document. 13-23. C. 7. 2009. M. Security & Privacy. 2006. Identity Management and Data Sharing in the European Union. 4. 4th International Conference on. 69-92.

Sign up to vote on this title
UsefulNot useful