Digital Identity
暫譯: 數位身份認證
Phillip J. Windley
- 出版商: O'Reilly
- 出版日期: 2005-09-06
- 售價: $1,420
- 貴賓價: 9.5 折 $1,349
- 語言: 英文
- 頁數: 256
- 裝訂: Paperback
- ISBN: 0596008783
- ISBN-13: 9780596008789
已過版
買這商品的人也買了...
-
$2,480$2,356 -
$2,030$1,929 -
$3,420Agile Software Development: Principles, Patterns, and Practices (Hardcover)
-
$590$460 -
$480$374 -
$300$255 -
$750$593 -
$1,127Artificial Intelligence Illuminated (Paperback)
-
$580$493 -
$620$484 -
$650$507 -
$490$417 -
$980$931 -
$620$527 -
$880$748 -
$320$253 -
$820$697 -
$580$493 -
$680$646 -
$880$695 -
$3,026$2,875 -
$650$507 -
$1,080CMMI: Guidelines for Process Integration and Product Improvement, 2/e
-
$595$583 -
$2,460$2,337
相關主題
商品描述
Description:
The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopted a siege mentality, building walls to keep the bad guys out. It makes for a secure perimeter, but hampers the flow of commerce.
Fortunately, some corporations are beginning to rethink how they provide security, so that interactions with customers, employees, partners, and suppliers will be richer and more flexible. Digital Identity explains how to go about it. This book details an important concept known as "identity management architecture" (IMA): a method to provide ample protection while giving good guys access to vital information and systems. In today's service-oriented economy, digital identity is everything. IMA is a coherent, enterprise-wide set of standards, policies, certifications and management activities that enable companies like yours to manage digital identity effectively--not just as a security check, but as a way to extend services and pinpoint the needs of customers.
Author Phil Windley likens IMA to good city planning. Cities define uses and design standards to ensure that buildings and city services are consistent and workable. Within that context, individual buildings--or system architectures--function as part of the overall plan. With Windley's experience as VP of product development for Excite@Home.com and CIO of Governor Michael Leavitt's administration in Utah, he provides a rich, real-world view of the concepts, issues, and technologies behind identity management architecture.
How does digital identity increase business opportunity? Windley's favorite example is the ATM machine. With ATMs, banks can now offer around-the-clock service, serve more customers simultaneously, and do it in a variety of new locations. This fascinating book shows CIOs, other IT professionals, product managers, and programmers how security planning can support business goals and opportunities, rather than holding them at bay.
Table of Contents:
Foreword
Preface
1. Introduction
Business Opportunity
Digital Identity Matters
Using Digital Identity
The Business Context of Identity
Foundational Technologies for Digital Identity
Identity Management Architectures
2. Defining Digital Identity
The Language of Digital Identity
Identity Scenarios in the Physical World
Identity, Security, and Privacy
Digital Identity Perspectives
Identity Powershifts
Conclusion
3. Trust
What Is Trust?
Trust and Evidence
Trust and Risk
Reputation and Trust Communities
Conclusion
4. Privacy and Identity
Who's Afraid of RFID?
Privacy Pragmatism
Privacy Drivers
Privacy Audits
Privacy Policy Capitalism
Anonymity and Pseudonymity
Privacy Principles
Prerequisites
Conclusion
5. The Digital Identity Lifecycle
Provisioning
Propagating
Using
Maintaining
Deprovisioning
Conclusion
6. Integrity, Non-Repudiation, and Confidentiality
Integrity
Non-Repudiation
Confidentiality
Conclusion
7. Authentication
Authentication and Trust
Authentication Systems
Authentication System Properties
Conclusion
8. Access Control
Policy First
Authorization Patterns
Abstract Authorization Architectures
Digital Certificates and Access Control
Conclusion
9. Names and Directories
Utah.gov: Naming and Directories
Naming
Directories
Aggregating Directory Information
Conclusion
10. Digital Rights Management
Digital Leakage
The DRM Battle
Apple iTunes: A Case Study in DRM
Features of DRM
DRM Reference Architecture
Trusted Computing Platforms
Specifying Rights
Conclusion
11. Interoperability Standards
Standards and the Digital Identity Lifecycle
Integrity and Non-Repudiation: XML Signature
Confidentiality: XML Encryption
Authentication and Authorization Assertions
Example SAML Use Cases
Identity Provisioning
Representing and Managing Authorization Policies
Conclusion
12. Federating Identity
Centralized Versus Federated Identity
The Mirage of Centralized Efficiency
Network Effects and Digital Identity Management
Federation in the Credit Card Industry
Benefits of Federated Identity
Digital Identity Standards
Three Federation Patterns
Conclusion
13. An Architecture for Digital Identity
Identity Management Architecture
The Benefits of an Identity Management Architecture
Success Factors
Roadblocks
Identity Management Architecture Components
Conclusion
14. Governance and Business Modeling
IMA Lifecycle
IMA Governance Model
Initial Steps
Creating a Vision
IMA Governing Roles
Resources
What to Outsource
Understanding the Business Context
Business Function Matrix
IMA Principles
Conclusion
15. Identity Maturity Models and Process Architectures
Maturity Levels
The Maturity Model
The Rights Steps at the Right Time
Finding Identity Processes
Evaluating Processes
A Practical Action Plan
Filling the Gaps with Best Practices
Conclusion
16. Identity Data Architectures
Build a Data Architecture
Processes Link Identities
Data Categorization
Identity Data Structure and Metadata
Exchanging Identity Data
Principles for Identity Data
Conclusion
17. Interoperability Frameworks for Identity
Principles of a Good IF
Contents of an Identity IF
Example Interoperability Framework
A Word of Warning
Conclusion
18. Identity Policies
The Policy Stack
Attributes of a Good Identity Policy
Determining Policy Needs
Writing Identity Policies
An Identity Policy Suite
Assessing Identity Policies
Enforcement
Procedures
Conclusion
19. Identity Management Reference Architectures
Reference Architectures
Benefits and Pitfalls
Reference Architecture Best Practices
Using a Reference Architecture
Components of a Reference Architecture
Technical Position Statements
Consolidated Infrastructure Blueprint
System Reference Architectures
Conclusion
20. Building an Identity Management Architecture
Scoping the Process
Which Projects Are Enterprise Projects?
Sequencing the IMA Effort
A Piece at a Time
Conclusion: Dispelling IMA Myths
Index
商品描述(中文翻譯)
**描述:**
在過去十年中,基於網路的自動化服務的興起無疑改變了企業的運作方式,但並不總是朝著更好的方向發展。提供服務、進行交易和在網路上移動數據開啟了新的機會,但許多首席技術官(CTO)和首席資訊官(CIO)更關心的是風險。就像中世紀城市的統治者一樣,他們採取了圍城的心態,建立牆壁以阻擋壞人。這雖然形成了一個安全的周邊,但卻阻礙了商業的流通。
幸運的是,一些企業開始重新思考如何提供安全性,以便與客戶、員工、合作夥伴和供應商的互動更加豐富和靈活。《數位身份》解釋了如何做到這一點。本書詳細介紹了一個重要概念,稱為「身份管理架構」(Identity Management Architecture, IMA):這是一種在提供充分保護的同時,讓好人能夠訪問重要信息和系統的方法。在當今以服務為導向的經濟中,數位身份就是一切。IMA是一套連貫的、企業範圍內的標準、政策、認證和管理活動,使像您這樣的公司能夠有效管理數位身份——不僅僅作為安全檢查,而是作為擴展服務和精確定位客戶需求的一種方式。
作者 Phil Windley 將 IMA 比作良好的城市規劃。城市定義用途和設計標準,以確保建築和城市服務的一致性和可行性。在這種背景下,單個建築——或系統架構——作為整體計劃的一部分運作。憑藉 Windley 在 Excite@Home.com 擔任產品開發副總裁和猶他州州長 Michael Leavitt 行政團隊的 CIO 的經驗,他提供了關於身份管理架構背後的概念、問題和技術的豐富現實觀點。
數位身份如何增加商業機會?Windley 最喜歡的例子是自動提款機(ATM)。有了 ATM,銀行現在可以提供全天候服務,同時服務更多客戶,並在各種新地點進行操作。這本引人入勝的書向 CIO、其他 IT 專業人員、產品經理和程式設計師展示了安全規劃如何支持商業目標和機會,而不是阻礙它們。
**目錄:**
**前言**
**序言**
**1. 介紹**
商業機會
數位身份的重要性
使用數位身份
身份的商業背景
數位身份的基礎技術
身份管理架構
**2. 定義數位身份**
數位身份的語言
物理世界中的身份場景
身份、安全性和隱私
數位身份的觀點
身份權力轉移
結論
**3. 信任**
什麼是信任?
信任與證據
信任與風險
聲譽與信任社群
結論
**4. 隱私與身份**
誰害怕 RFID?
隱私務實主義
隱私驅動因素
隱私審計
隱私政策資本主義
匿名性與假名性
隱私原則
前提條件
結論
**5. 數位身份生命周期**
供應
傳播
使用
維護
撤銷供應
結論
**6. 完整性、不可否認性與保密性**
完整性
不可否認性
保密性
結論
**7. 認證**
認證與信任
認證系統
認證系統屬性
結論
**8. 存取控制**
政策優先
授權模式
抽象授權架構
數位證書與存取控制
結論
**9. 名稱與目錄**
Utah.gov:命名與目錄
命名
目錄
聚合目錄信息
結論
**10. 數位權利管理**
數位洩漏
DRM 戰鬥
Apple iTunes:DRM 的案例研究
DRM 的特徵
DRM 參考架構
受信計算平台
指定權利
結論
**11. 互操作性標準**
標準與數位身份生命周期
完整性與不可否認性:XML 簽名
保密性:XML 加密
認證與授權聲明
示例 SAML 使用案例
身份供應
表示與管理授權政策
結論
**12. 聯邦身份**
集中式與聯邦身份
集中式效率的幻影
網路效應與數位身份管理
信用卡行業的聯邦
聯邦身份的好處
數位身份標準
三種聯邦模式
結論
**13. 數位身份架構**
身份管理架構
身份管理架構的好處
成功因素
障礙
身份管理架構組件
結論
**14. 治理與商業建模**
IMA 生命週期
IMA 治理模型
初步步驟
創建願景
IMA 治理角色
資源
外包內容
理解商業背景
商業功能矩陣
IMA 原則
結論
**15. 身份成熟度模型與流程架構**
成熟度等級
成熟度模型
在正確的時間採取正確的步驟
尋找身份流程
評估流程
實用行動計劃
用最佳實踐填補空白
結論
**16. 身份數據架構**
建立數據架構
流程連結身份
數據分類
身份數據結構與元數據
交換身份數據
身份數據原則
結論
**17. 身份的互操作性框架**
良好互操作性框架的原則
身份互操作性框架的內容
示例互操作性框架
警告
結論
**18. 身份政策**
政策堆疊
良好身份政策的屬性
確定政策需求
撰寫身份政策
身份政策套件
評估身份政策
執行
程序
結論
**19. 身份管理參考架構**
參考架構
好處與陷阱
參考架構最佳實踐
使用參考架構
參考架構的組件
技術立場聲明
整合基礎設施藍圖
系統參考架構
結論