I

  • IBM, 863
  • Identification, 711–715
  • Identifier (ID), 47, 389
  • Identity, 100
    • governance, 488
  • Identity and access management (IAM), 47–49, 488, 496
    • authentication, 47–48
    • authorization, 48–49
    • importance of secure socket layer/transport layer security, 48
    • password rule hardening, 48
  • Identity Based Access Control (IBAC), 187, 199–200
  • Identity-based cryptography (IBC), 348, 402
    • used in radio frequency identification (RFID) networks, 400–402
  • Identity-Based Encryption (IBE) system, 822
  • Identity management (IDM), 181–187, 644
    • advanced hypertext transfer protocol (HTTP) security, 185
    • building federations with WS-federation, 185
    • OAuth overview and use cases, 185–186
    • OpenID connect, 186–187
    • security assertion markup language (SAML), ...

Get Computer and Information Security Handbook, 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.