{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T16:46:11Z","timestamp":1769013971177,"version":"3.49.0"},"reference-count":52,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,1]]},"abstract":"<jats:p>This article describes how in today's digital world, customers have made it a common practice to maintain user accounts with different service providers to access a range of services. In such environment, all attributes of the identity must be verified to operate, otherwise the resources would be vulnerable to financial and data loss. This article contends that makes it important to form an Identity Management System, which could provide central administration, user self- service, role based access control and integrated user management. Identity Management becomes very much vital for the environment working with multiple technologies, as it governs an entity (i.e. a human or a software agent) to authenticate and authorize for accessing the network via multiple technologies. Successful Identity Management increases the efficiency, security, access control and decreases the complexity, cost and many repetitive works. Essential features of present day identity management systems have been identified in the present work. A comparative analysis of these identity management systems has been carried out to establish the present-day industry practices. Along with that, specific challenges to the present-day identity management systems have been identified. The article helps in the identification of suitable Identity Management System for specific applications.<\/jats:p>","DOI":"10.4018\/ijsds.2018010105","type":"journal-article","created":{"date-parts":[[2018,2,1]],"date-time":"2018-02-01T15:17:45Z","timestamp":1517498265000},"page":"63-78","source":"Crossref","is-referenced-by-count":28,"title":["Identity Management Systems"],"prefix":"10.4018","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6753-1557","authenticated-orcid":true,"given":"Vikas","family":"Kumar","sequence":"first","affiliation":[{"name":"School of Business Studies, Sharda University, Greater Noida, India"}]},{"given":"Aashish","family":"Bhardwaj","sequence":"additional","affiliation":[{"name":"Mewar University, Chittorgarh, India"}]}],"member":"2432","reference":[{"key":"IJSDS.2018010105-0","unstructured":"CA.com. (n.d.). Identity management. Retrieved 05.08.2015 from http:\/\/www.ca.com\/in\/identity-management.aspx"},{"key":"IJSDS.2018010105-1","doi-asserted-by":"crossref","unstructured":"Chadwick, D. (2009). Federated identity management. In Foundations of security analysis and design V (pp. 96-120).","DOI":"10.1007\/978-3-642-03829-7_3"},{"issue":"4","key":"IJSDS.2018010105-2","first-page":"1097","article-title":"Microsoft Corporation, Architecture Journal.Chonka, A., Xiang, Y., Zhou, W., &Bonti, A. (2011). Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks.","volume":"34","author":"F.Chog","year":"2004","journal-title":"Journal of Network and Computer Applications"},{"key":"IJSDS.2018010105-3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.06.004"},{"key":"IJSDS.2018010105-4","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00217-1"},{"key":"IJSDS.2018010105-5","unstructured":"IDG Communication. (2017). Marketing services. Retrieved 11.10.2017 from https:\/\/www.idg.com\/marketingservices\/"},{"key":"IJSDS.2018010105-6","unstructured":"Courion. (n.d.). Retrieved 12.12.2013 from http:\/\/www.courion.com\/"},{"key":"IJSDS.2018010105-7","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2008.07.001"},{"key":"IJSDS.2018010105-8","unstructured":"Del \u00c1lamo, J. M. (2007). Leveraging New Business Models with Identity Management\u2013An e-learning case study."},{"key":"IJSDS.2018010105-9","unstructured":"e-trustsecurity.com. (n.d.). Retrieved 15.11.2017 from http:\/\/www.e-trustsecurity.com\/"},{"key":"IJSDS.2018010105-10","unstructured":"Empowerid.com. (n.d.). Retrieved 24.03.2015 from http:\/\/www.empowerid.com\/"},{"key":"IJSDS.2018010105-11","unstructured":"Gartner. (2014). Identity and access management iam. Retrieved 19.07.2014 from http:\/\/www.gartner.com\/it-glosary\/identity-and-access-management-iam\/"},{"key":"IJSDS.2018010105-12","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2009.40"},{"key":"IJSDS.2018010105-13","unstructured":"Hewitt, A., & Forte, A. (2006). Crossing boundaries: Identity management and student\/faculty relationships on the Facebook. Poster presented at CSCW, Banff, Alberta."},{"key":"IJSDS.2018010105-14","unstructured":"Hitachi. (2014). Websso. Retrieved 22.12.2016 from http:\/\/hitachi-id.com\/concepts\/websso.html"},{"key":"IJSDS.2018010105-15","unstructured":"IBM. (n.d.). Identity management. Retrieved 11.08.2017 from http:\/\/www-01.ibm.com\/software\/tivoli\/products\/identity-mgr\/"},{"key":"IJSDS.2018010105-16","unstructured":"Identity Theft Resource center. (2016). 2015 data breaches. Retrieved from http:\/\/www.idtheftcenter.org\/ITRC-Surveys-Studies\/2015databreaches.html"},{"key":"IJSDS.2018010105-17","unstructured":"III.org. (n.d.). Facts statistics identity theft and cybercrime. Retrieved 11.10.2017 from https:\/\/www.iii.org\/fact-statistic\/facts-statistics-identity-theft-and-cybercrime"},{"key":"IJSDS.2018010105-18","unstructured":"Internetworldstats.com. (n.d.). Retrieved 22.05.2015 from http:\/\/www.internetworldstats.com.stats.htm"},{"key":"IJSDS.2018010105-19","unstructured":"Javelin Strategy & Research. (2017), 2017 Identity Fraud Study Retrieved 11.10.2017 from https:\/\/www.javelinstrategy.com\/coverage-area\/2017-identity-fraud"},{"key":"IJSDS.2018010105-20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2009.07.004"},{"key":"IJSDS.2018010105-21","doi-asserted-by":"publisher","DOI":"10.4018\/IJEIS.2016010102"},{"key":"IJSDS.2018010105-22","author":"J.Lewis","year":"2003","journal-title":"Enterprise Identity Management: It\u2019s About the Business"},{"key":"IJSDS.2018010105-23","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-79026-8_6"},{"key":"IJSDS.2018010105-24","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.07.020"},{"key":"IJSDS.2018010105-25","unstructured":"Microsoft. (n.d.). Microsoft Identity Manager. Retrieved 15.06.2015 from https:\/\/www.microsoft.com\/en-in\/cloud-platform\/microsoft-identity-manager"},{"key":"IJSDS.2018010105-26","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2010.03.037"},{"key":"IJSDS.2018010105-27","unstructured":"Novell.com. (n.d.). Novell Identity Manager 3.5.1 Administration Guide. Retrieved 15.11.2017 from https:\/\/www.novell.com\/documentation\/idm35\/admin\/data\/front.html"},{"key":"IJSDS.2018010105-28","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.60"},{"key":"IJSDS.2018010105-29","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2007.07.001"},{"key":"IJSDS.2018010105-30","unstructured":"One Identity. (n.d.). Retrieved 11.08.2017 from http:\/\/www.quest.com\/quest-one-identity-manager\/"},{"key":"IJSDS.2018010105-31","unstructured":"Oracle. (n.d.). Overview Identity management. Retrieved 11.08.2017 from http:\/\/www.oracle.com\/us\/products\/middleware\/identity-management\/overview\/index.html"},{"key":"IJSDS.2018010105-32","unstructured":"Parliament of the Republic of South Africa. (n.d.). ECT act. Retrieved 13.08.2017 from http:\/\/www.internet.org.za\/ect_act.html"},{"key":"IJSDS.2018010105-33","doi-asserted-by":"publisher","DOI":"10.4018\/IJVCSN.2016100101"},{"key":"IJSDS.2018010105-34","unstructured":"Radicati S. (2012). Email Statistics Report, 2012 - 2016. Theradicati group, Inc. Retrieved from http:\/\/www.radicati.com\/wp\/wp-content\/uploads\/2012\/04\/Email-Statistics-Report-2012-2016-Executive-Summary.pdf"},{"key":"IJSDS.2018010105-35","unstructured":"Rundle, M., Blakley, B., Broberg, J., Nadalin, A., Olds, D., Ruddy, M., . . . Trevithick, P. (2008). At a crossroads: \u201cPersonhood\u201d and digital identity in the information society. OECD. Retrieved from www.oecd.org\/dataoecd\/31\/6\/40204773.doc"},{"key":"IJSDS.2018010105-36","unstructured":"Techtarget.com. (2017). Search Unified Communication. Retrieved 11.10.2017 from http:\/\/searchunifiedcommunications.techtarget.com\/"},{"key":"IJSDS.2018010105-37","doi-asserted-by":"publisher","DOI":"10.4018\/ijcac.2013100102"},{"key":"IJSDS.2018010105-38","doi-asserted-by":"publisher","DOI":"10.4018\/jitr.2014070103"},{"key":"IJSDS.2018010105-39","unstructured":"Socialnomics (2016). 4 case studies in fraud, social media and identity theft. Retrieved 13.08.2017 from https:\/\/socialnomics.net\/2016\/01\/13\/4-case-studies-in-fraud-social-media-and-identity-theft\/"},{"key":"IJSDS.2018010105-40","unstructured":"Sunidmguru. (n.d.). Services. Retrieved 11.08.2017 from http:\/\/www.sunidmguru.com\/services.php"},{"key":"IJSDS.2018010105-41","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2010.05.005"},{"key":"IJSDS.2018010105-42","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2009.07.044"},{"key":"IJSDS.2018010105-43","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2010.03.002"},{"key":"IJSDS.2018010105-44","author":"R.Team","year":"2015","journal-title":"Email Statistics Report, 2015-2019"},{"key":"IJSDS.2018010105-45","doi-asserted-by":"publisher","DOI":"10.1109\/MPOT.2008.929295"},{"key":"IJSDS.2018010105-46","unstructured":"Trewport.com. (n.d.). Retrieved 11.08.2017 from http:\/\/www.trewport.com\/#section1"},{"key":"IJSDS.2018010105-47","doi-asserted-by":"publisher","DOI":"10.1109\/IndiaCom.2014.6828017"},{"key":"IJSDS.2018010105-48","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(11)70028-8"},{"key":"IJSDS.2018010105-49","unstructured":"Worldmeters. (n.d.). World population. Retrieved 11.08.2017 from http:\/\/www.worldmeters.info\/world-population"},{"key":"IJSDS.2018010105-50","unstructured":"Worldometers. (n.d.). World Population. Retrieved 11.10.2017 from http:\/\/www.worldometers.info\/world-population\/"},{"key":"IJSDS.2018010105-51","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.12.006"}],"container-title":["International Journal of Strategic Decision Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=198946","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T12:10:24Z","timestamp":1651839024000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJSDS.2018010105"}},"subtitle":["A Comparative Analysis"],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":52,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.4018\/ijsds.2018010105","relation":{},"ISSN":["1947-8569","1947-8577"],"issn-type":[{"value":"1947-8569","type":"print"},{"value":"1947-8577","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1]]}}}