Johnson, 2003
| Publication | Publication Date | Title |
|---|---|---|
| US8397077B2 (en) | Client side authentication redirection | |
| US7380271B2 (en) | Grouped access control list actions | |
| US7117529B1 (en) | Identification and authentication management | |
| US8281374B2 (en) | Attested identities | |
| US20030177376A1 (en) | Framework for maintaining information security in computer networks | |
| US7428748B2 (en) | Method and system for authentication in a business intelligence system | |
| MXPA04007410A (en) | Moving principals across security boundaries without service interruption. | |
| Kak | Zero Trust Evolution & Transforming Enterprise Security | |
| Purba et al. | Assessing Privileged Access Management (PAM) using ISO 27001: 2013 Control | |
| Cisco | White Paper: Security Best Practices for Cisco Unity | |
| Johnson | Key fingerprint= AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 | |
| Cole et al. | Wiley pathways network security fundamentals | |
| Rao et al. | Access controls | |
| Wairagade | Role of Identity and Access Management in Corporate Management | |
| Tso et al. | Access Control of Web and Java Based Applications | |
| Murray | 'Prove It': Online Password Safety | |
| Ngiyulu | Cybersecurity Project at Company X | |
| Anand | Role of IAM in an Organization | |
| Sherwood | Opening up the enterprise | |
| Walsh et al. | Identity Security for Software Development: Best Practices That Every Developer Must Know | |
| Pace | Identity management | |
| Hardy | The truth behind single sign-on | |
| McKinley | Implementing the Naval Postgraduate School's security policy using Windows 2000 | |
| Bonsall | Remote Access Authentication | |
| Kalwani | The Benefits of CyberArk PAM (Privileged Access Management) solution and how to use it |