Managing enterprise complexity

the use of Identity Management Architecture to control enterprise resources

Research output: ThesisDoctoral Thesis

72 Downloads (Pure)

Abstract

There have been a number of articles in the literature that discuss the creation of an architecture for identity management. However these have generally been technical implementations of secure authentication processes rather than the description of an architectural design with one notable exception. This thesis explores the level of understanding of identity management architecture along with its place in the literature and its use in industry. It also defines the major terms used in identity management. The research is based on a case study of eight Australian public sector agencies that had designed identity management systems. The case study allowed the essential elements of identity management systems to be identified. The identification of these elements enabled the development of a new Identity Management Architecture (IdMA). This IdMA was designed as a series of frameworks that will integrate identity management into the existing policies, processes, workflows, technologies and data of an enterprise. Each framework combines one or more of these identity management elements with the relevant enterprise processes and workflows into an integrated set of processes and workflows.
Original languageEnglish
QualificationDoctor of Information Technology
Awarding Institution
  • Charles Sturt University
Supervisors/Advisors
  • Weckert, John, Co-Supervisor
  • Altas, Irfan, Co-Supervisor
  • Howarth, Jason, Co-Supervisor
Place of PublicationAustralia
Publisher
Publication statusPublished - 2009

Fingerprint

Identity management
Resources
Management system
Industry
Public sector
An enterprise
Integrated
Workflow technology
Authentication
Policy process

Cite this

@phdthesis{207582ab650649cfa48c1169eff70990,
title = "Managing enterprise complexity: the use of Identity Management Architecture to control enterprise resources",
abstract = "There have been a number of articles in the literature that discuss the creation of an architecture for identity management. However these have generally been technical implementations of secure authentication processes rather than the description of an architectural design with one notable exception. This thesis explores the level of understanding of identity management architecture along with its place in the literature and its use in industry. It also defines the major terms used in identity management. The research is based on a case study of eight Australian public sector agencies that had designed identity management systems. The case study allowed the essential elements of identity management systems to be identified. The identification of these elements enabled the development of a new Identity Management Architecture (IdMA). This IdMA was designed as a series of frameworks that will integrate identity management into the existing policies, processes, workflows, technologies and data of an enterprise. Each framework combines one or more of these identity management elements with the relevant enterprise processes and workflows into an integrated set of processes and workflows.",
author = "Peter White",
year = "2009",
language = "English",
publisher = "Charles Sturt University",
address = "Australia",
school = "Charles Sturt University",

}

White, P 2009, 'Managing enterprise complexity: the use of Identity Management Architecture to control enterprise resources', Doctor of Information Technology, Charles Sturt University, Australia.

Managing enterprise complexity : the use of Identity Management Architecture to control enterprise resources. / White, Peter.

Australia : Charles Sturt University, 2009. 195 p.

Research output: ThesisDoctoral Thesis

TY - THES

T1 - Managing enterprise complexity

T2 - the use of Identity Management Architecture to control enterprise resources

AU - White, Peter

PY - 2009

Y1 - 2009

N2 - There have been a number of articles in the literature that discuss the creation of an architecture for identity management. However these have generally been technical implementations of secure authentication processes rather than the description of an architectural design with one notable exception. This thesis explores the level of understanding of identity management architecture along with its place in the literature and its use in industry. It also defines the major terms used in identity management. The research is based on a case study of eight Australian public sector agencies that had designed identity management systems. The case study allowed the essential elements of identity management systems to be identified. The identification of these elements enabled the development of a new Identity Management Architecture (IdMA). This IdMA was designed as a series of frameworks that will integrate identity management into the existing policies, processes, workflows, technologies and data of an enterprise. Each framework combines one or more of these identity management elements with the relevant enterprise processes and workflows into an integrated set of processes and workflows.

AB - There have been a number of articles in the literature that discuss the creation of an architecture for identity management. However these have generally been technical implementations of secure authentication processes rather than the description of an architectural design with one notable exception. This thesis explores the level of understanding of identity management architecture along with its place in the literature and its use in industry. It also defines the major terms used in identity management. The research is based on a case study of eight Australian public sector agencies that had designed identity management systems. The case study allowed the essential elements of identity management systems to be identified. The identification of these elements enabled the development of a new Identity Management Architecture (IdMA). This IdMA was designed as a series of frameworks that will integrate identity management into the existing policies, processes, workflows, technologies and data of an enterprise. Each framework combines one or more of these identity management elements with the relevant enterprise processes and workflows into an integrated set of processes and workflows.

M3 - Doctoral Thesis

PB - Charles Sturt University

CY - Australia

ER -