Digital Identity: Unmasking Identity Management Architecture (IMA)
4/5
()
Currently unavailable
Currently unavailable
About this ebook
The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopted a siege mentality, building walls to keep the bad guys out. It makes for a secure perimeter, but hampers the flow of commerce.
Fortunately, some corporations are beginning to rethink how they provide security, so that interactions with customers, employees, partners, and suppliers will be richer and more flexible. Digital Identity explains how to go about it. This book details an important concept known as "identity management architecture" (IMA): a method to provide ample protection while giving good guys access to vital information and systems. In today's service-oriented economy, digital identity is everything. IMA is a coherent, enterprise-wide set of standards, policies, certifications and management activities that enable companies like yours to manage digital identity effectively--not just as a security check, but as a way to extend services and pinpoint the needs of customers.
Author Phil Windley likens IMA to good city planning. Cities define uses and design standards to ensure that buildings and city services are consistent and workable. Within that context, individual buildings--or system architectures--function as part of the overall plan. With Windley's experience as VP of product development for Excite@Home.com and CIO of Governor Michael Leavitt's administration in Utah, he provides a rich, real-world view of the concepts, issues, and technologies behind identity management architecture.
How does digital identity increase business opportunity? Windley's favorite example is the ATM machine. With ATMs, banks can now offer around-the-clock service, serve more customers simultaneously, and do it in a variety of new locations. This fascinating book shows CIOs, other IT professionals, product managers, and programmers how security planning can support business goals and opportunities, rather than holding them at bay.
Phillip J. Windley
Phil Windley is a Principal Engineer in the Office of Information Technology at Brigham Young University. He was the Founding Chair of the Sovrin Foundation, serving from 2016 to 2020. He is also the co-founder and organizer of the Internet Identity Workshop, one of the world’s most important and long-lived identity conferences. Phil writes the popular Technometria blog, and is the author of the books The Live Web (Course Technology, 2011) and Digital Identity (O'Reilly Media, 2005). Phil has served on the Boards of Directors and Advisory Boards for several high-tech companies. Phil has been a professor of Computer Science at Brigham Young University (twice) and the University of Idaho. In addition, Phil was the Founder and Chief Technology Officer of Kynetx, the company behind the open-source connected-car product, Fuse. He also spent two years as the Chief Information Officer (CIO) for the State of Utah in 2001-2002, serving on Governor Mike Leavitt's Cabinet and as a member of his Senior Staff. Before entering public service, Phil was Vice President for Product Development and Operations at Excite@Home. He was the Founder and Chief Technology Officer (CTO) of iMALL, Inc. an early creator of ecommerce tools. Phil received his Ph.D. in Computer Science from University of California, Davis in 1990.
Related to Digital Identity
Related ebooks
Working With Agencies: An Insider's Guide Rating: 0 out of 5 stars0 ratingsHow to Start and Run an eBay Consignment Business Rating: 0 out of 5 stars0 ratingsIBM Cognos 8 Business Intelligence: The Official Guide Rating: 0 out of 5 stars0 ratingsTurn eBay Data into Dollars Rating: 4 out of 5 stars4/5Interconnecting Smart Objects with IP: The Next Internet Rating: 5 out of 5 stars5/5The Ultimate Small Business Marketing Toolkit: All the Tips, Forms, and Strategies You'll Ever Need! Rating: 3 out of 5 stars3/5Financial Business Intelligence: Trends, Technology, Software Selection, and Implementation Rating: 0 out of 5 stars0 ratingsConvergence: User Expectations, Communications Enablers and Business Opportunities Rating: 0 out of 5 stars0 ratingsMoving To The Cloud: Developing Apps in the New World of Cloud Computing Rating: 3 out of 5 stars3/5The Basics of Cloud Computing: Understanding the Fundamentals of Cloud Computing in Theory and Practice Rating: 0 out of 5 stars0 ratingsDevelopment Research in Practice: The DIME Analytics Data Handbook Rating: 0 out of 5 stars0 ratingsScene of the Cybercrime Rating: 4 out of 5 stars4/5Excel VBA Macro Programming Rating: 0 out of 5 stars0 ratingsHow to Profit in the Stock Market: Short-Term Trading and Investing Strategies for Beginners Rating: 5 out of 5 stars5/5Python for Microcontrollers: Getting Started with MicroPython Rating: 0 out of 5 stars0 ratingsFuture Drivers of Growth in Rwanda: Innovation, Integration, Agglomeration, and Competition Rating: 0 out of 5 stars0 ratingsProgramming the Intel Galileo: Getting Started with the Arduino -Compatible Development Board Rating: 5 out of 5 stars5/53D Printer Projects for Makerspaces Rating: 4 out of 5 stars4/5Programming FPGAs: Getting Started with Verilog Rating: 4 out of 5 stars4/5Mastering Data Warehouse Design: Relational and Dimensional Techniques Rating: 4 out of 5 stars4/5Open Source Fuzzing Tools Rating: 0 out of 5 stars0 ratingsProgramming Arduino: Getting Started with Sketches, Third Edition Rating: 0 out of 5 stars0 ratingsThe Boston Institute of Finance Mutual Fund Advisor Course: Series 6 and Series 63 Test Prep Rating: 0 out of 5 stars0 ratingsThe Art and Science of Digital Compositing Rating: 5 out of 5 stars5/5Securing Windows Server 2008: Prevent Attacks from Outside and Inside Your Organization Rating: 0 out of 5 stars0 ratingsModern Embedded Computing: Designing Connected, Pervasive, Media-Rich Systems Rating: 5 out of 5 stars5/5Your First Sailboat, Second Edition Rating: 3 out of 5 stars3/5Microsoft SQL Server 2005: A Beginner''s Guide Rating: 0 out of 5 stars0 ratingsSecurity for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts Rating: 4 out of 5 stars4/5The Strategy Gap: Leveraging Technology to Execute Winning Strategies Rating: 0 out of 5 stars0 ratings
Computers For You
Mastering ChatGPT: 21 Prompts Templates for Effortless Writing Rating: 5 out of 5 stars5/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5The Insider's Guide to Technical Writing Rating: 0 out of 5 stars0 ratingsThe ChatGPT Millionaire Handbook: Make Money Online With the Power of AI Technology Rating: 0 out of 5 stars0 ratingsHow to Create Cpn Numbers the Right way: A Step by Step Guide to Creating cpn Numbers Legally Rating: 4 out of 5 stars4/5CompTIA Security+ Get Certified Get Ahead: SY0-701 Study Guide Rating: 5 out of 5 stars5/5Creating Online Courses with ChatGPT | A Step-by-Step Guide with Prompt Templates Rating: 4 out of 5 stars4/5Mindhacker: 60 Tips, Tricks, and Games to Take Your Mind to the Next Level Rating: 4 out of 5 stars4/5SQL QuickStart Guide: The Simplified Beginner's Guide to Managing, Analyzing, and Manipulating Data With SQL Rating: 4 out of 5 stars4/5Grokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5Deep Search: How to Explore the Internet More Effectively Rating: 5 out of 5 stars5/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Ultimate Guide to Mastering Command Blocks!: Minecraft Keys to Unlocking Secret Commands Rating: 5 out of 5 stars5/5Artificial Intelligence: The Complete Beginner’s Guide to the Future of A.I. Rating: 4 out of 5 stars4/5Dark Aeon: Transhumanism and the War Against Humanity Rating: 5 out of 5 stars5/5The Professional Voiceover Handbook: Voiceover training, #1 Rating: 5 out of 5 stars5/5Elon Musk Rating: 4 out of 5 stars4/5Procreate for Beginners: Introduction to Procreate for Drawing and Illustrating on the iPad Rating: 0 out of 5 stars0 ratingsCompTIA IT Fundamentals (ITF+) Study Guide: Exam FC0-U61 Rating: 0 out of 5 stars0 ratingsMaster Builder Roblox: The Essential Guide Rating: 4 out of 5 stars4/5CompTIA Security+ Practice Questions Rating: 2 out of 5 stars2/5Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5What Video Games Have to Teach Us About Learning and Literacy. Second Edition Rating: 4 out of 5 stars4/5
Reviews for Digital Identity
7 ratings0 reviews