Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Identity access management.

Zeitschriftenartikel zum Thema „Identity access management“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Identity access management" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Pol, Mr Vinay Jayprakash. „Identity and Access Management Tools“. International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (30.06.2019): 796–98. http://dx.doi.org/10.31142/ijtsrd23935.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Uddin, Mumina, und David Preston. „Systematic Review of Identity Access Management in Information Security“. Journal of Advances in Computer Networks 3, Nr. 2 (2015): 150–56. http://dx.doi.org/10.7763/jacn.2015.v3.158.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Carnley, P. Renee, und Houssain Kettani. „Identity and Access Management for the Internet of Things“. International Journal of Future Computer and Communication 8, Nr. 4 (Dezember 2019): 129–33. http://dx.doi.org/10.18178/ijfcc.2019.8.4.554.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Kumar, Vikas, und Aashish Bhardwaj. „Identity Management Systems“. International Journal of Strategic Decision Sciences 9, Nr. 1 (Januar 2018): 63–78. http://dx.doi.org/10.4018/ijsds.2018010105.

Der volle Inhalt der Quelle
Annotation:
This article describes how in today's digital world, customers have made it a common practice to maintain user accounts with different service providers to access a range of services. In such environment, all attributes of the identity must be verified to operate, otherwise the resources would be vulnerable to financial and data loss. This article contends that makes it important to form an Identity Management System, which could provide central administration, user self- service, role based access control and integrated user management. Identity Management becomes very much vital for the environment working with multiple technologies, as it governs an entity (i.e. a human or a software agent) to authenticate and authorize for accessing the network via multiple technologies. Successful Identity Management increases the efficiency, security, access control and decreases the complexity, cost and many repetitive works. Essential features of present day identity management systems have been identified in the present work. A comparative analysis of these identity management systems has been carried out to establish the present-day industry practices. Along with that, specific challenges to the present-day identity management systems have been identified. The article helps in the identification of suitable Identity Management System for specific applications.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Jin, Qiang, und Deren Kudeki. „Identity and Access Management for Libraries“. Technical Services Quarterly 36, Nr. 1 (02.01.2019): 44–60. http://dx.doi.org/10.1080/07317131.2018.1532056.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Fuchs, Ludwig, und Günther Pernul. „Qualitätssicherung im Identity- und Access Management“. HMD Praxis der Wirtschaftsinformatik 50, Nr. 1 (Februar 2013): 88–97. http://dx.doi.org/10.1007/bf03340780.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Pawar, Pratik. „KeyHound - Identity Provider and Access Management“. INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, Nr. 04 (09.04.2024): 1–5. http://dx.doi.org/10.55041/ijsrem30444.

Der volle Inhalt der Quelle
Annotation:
Single organization handles multiple applications based on different departments or needs. To access these applications, users must remember the login credentials for each. This results in the data of mutual users being stored in different identity providers, causing data redundancy and indirectly increasing storage costs. Solution is needed to globalize user credentials. Implementing a centralized system aids organizations in saving storage costs by eliminating redundant user data stored across multiple identity providers. Key Words: Identity provider and Management, Access management, Validation, Authorization.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Martin, Luther. „Identity-based Encryption: From Identity and Access Management to Enterprise Privacy Management“. Information Systems Security 16, Nr. 1 (28.03.2007): 9–14. http://dx.doi.org/10.1080/10658980601051268.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Saloni Kumari. „Identity and access management: "Elevating security and efficiency: Unveiling the crucial aspects of identity and access management”“. International Journal of Engineering & Technology 12, Nr. 1 (06.09.2023): 11–14. http://dx.doi.org/10.14419/ijet.v12i1.32333.

Der volle Inhalt der Quelle
Annotation:
The foundation of the software is the identity and access management system. A fundamental and essential cybersecurity competency is ensuring that the right parties have timely access to the right resources. The IAM has four domains: IAAA stands for identification, authentication, authorization, and accounting, the second is Privileged Access Management (PAM), third-party Identity Governance and Administration, data governance and protection. In this article, the concepts of identification, authentication, authorization, and accounting are discussed, as well as how IAAA works in an online setting.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Dhamdhere, Mayuri, Shridevi Karande und Madhura Phatak. „Peer Group Analysis in Identity and Access Management to Identify Anomalies“. International Journal of Engineering and Technology 9, Nr. 3S (17.07.2017): 116–21. http://dx.doi.org/10.21817/ijet/2017/v9i3/170903s020.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Kunz, Michael, Alexander Puchta, Sebastian Groll, Ludwig Fuchs und Günther Pernul. „Attribute quality management for dynamic identity and access management“. Journal of Information Security and Applications 44 (Februar 2019): 64–79. http://dx.doi.org/10.1016/j.jisa.2018.11.004.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Goth, G. „Identity management, access specs are rolling along“. IEEE Internet Computing 9, Nr. 1 (Januar 2005): 9–11. http://dx.doi.org/10.1109/mic.2005.16.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Everett, Cath. „Identity and Access Management: the second wave“. Computer Fraud & Security 2011, Nr. 5 (Mai 2011): 11–13. http://dx.doi.org/10.1016/s1361-3723(11)70051-3.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Varma, Hardik. „Identity Access Management (IAM), Privilege Access Management (PAM) & Security Operation Center (SOC)“. International Journal for Research in Applied Science and Engineering Technology 9, Nr. 11 (30.11.2021): 1460–66. http://dx.doi.org/10.22214/ijraset.2021.39029.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Crnic, Josipa. „Access and Identity Management for Libraries: Controlling Access to Online Information“. Australian Academic & Research Libraries 46, Nr. 1 (02.01.2015): 64–65. http://dx.doi.org/10.1080/00048623.2014.993451.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Maclean, Lesa. „Access and identity management for libraries: Controlling access to online information“. Australian Library Journal 64, Nr. 1 (02.01.2015): 57. http://dx.doi.org/10.1080/00049670.2014.988841.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Lodwick, David. „Access and Identity Management for Libraries: Controlling Access to Online Information“. Technical Services Quarterly 32, Nr. 1 (17.12.2014): 112–13. http://dx.doi.org/10.1080/07317131.2015.972909.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Gunter, Carl, David Liebovitz und Bradley Malin. „Experience-Based Access Management: A Life-Cycle Framework for Identity and Access Management Systems“. IEEE Security & Privacy Magazine 9, Nr. 5 (September 2011): 48–55. http://dx.doi.org/10.1109/msp.2011.72.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Ahmed, Md Rayhan, A. K. M. Muzahidul Islam, Swakkhar Shatabda und Salekul Islam. „Blockchain-Based Identity Management System and Self-Sovereign Identity Ecosystem: A Comprehensive Survey“. IEEE Access 10 (2022): 113436–81. http://dx.doi.org/10.1109/access.2022.3216643.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Chunduru, Anilkumar, und Sumathy S. „Security strategies for cloud identity management - a study“. International Journal of Engineering & Technology 7, Nr. 2 (12.05.2018): 732. http://dx.doi.org/10.14419/ijet.v7i2.10410.

Der volle Inhalt der Quelle
Annotation:
Emphasis on security for providing Access Control in Cloud computing environment plays a significant role. Cloud computing provides number of benefits such as resource sharing, low speculation and large storage space. Huge amount of information stored in cloud can be accessed from anywhere, anytime on pay-per use basis. Resources in cloud should be accessed only by the authorized clients. Access Control in cloud computing has become a critical issue due to increasing number of users experiencing dynamic changes. Authentication, authorization and approval of the access ensuring liability of entities from login credentials including passwords and biometric scan is essential. Also, the federated authentication management is secured. Current approaches require large-scale distributed access control in cloud environment. Data security and access control are the drawbacks in existing access control schemes. Due to the drawbacks in existing access control schemes such as privacy of information when susceptible information is stored in intermediary service provider a federated identity access management is essential. Access control applications majorly concentrate on Healthcare, Government Organizations, Commercial, Critical Infrastructure and Financial Institutions. This review illustrates a detailed study of access control models in cloud computing and various cloud identity management schemes.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Al zoubi, Qusay M., Yousef K. Sanjalawe und Mohammed Anbar. „An evaluation of identity and access management systems“. International Journal of Internet Technology and Secured Transactions 11, Nr. 1 (2021): 35. http://dx.doi.org/10.1504/ijitst.2021.10035182.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Duggal, Ashmeet Kaur, und Meenu Dave Dr. „INTELLIGENT IDENTITY AND ACCESS MANAGEMENT USING NEURAL NETWORKS“. Indian Journal of Computer Science and Engineering 12, Nr. 1 (20.02.2021): 47–56. http://dx.doi.org/10.21817/indjcse/2021/v12i1/211201154.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Devlekar, Sanket, und Vidyavati Ramteke. „Identity and Access Management: High-level Conceptual Framework“. Revista Gestão Inovação e Tecnologias 11, Nr. 4 (24.08.2021): 4885–97. http://dx.doi.org/10.47059/revistageintec.v11i4.2511.

Der volle Inhalt der Quelle
Annotation:
Information security is shifting from a traditional perimeter-based approach to an identity-based approach where the organization's boundaries are where their digital identities exist. The organization has multiple stakeholders having access to various organization resources. Systems and applications are part of organization resources that help them achieve their business goals. These systems and applications are internally or externally exposed to allow all stakeholders to have seamless access, thus making identity and access management a big challenge. Identity and Access Management (IAM) is a fundamental part of information security. It plays a critical role in keeping the organization's information security posture resilient to cyber attacks. This paper will identify various components of an IAM solution that are essential and should be considered while implementing and assessing the IAM solution and provides a high-level IAM framework that will allow information security professionals to assess the IAM security posture of an organization.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Sanjalawe, Yousef K., Mohammed Anbar und Qusay M. Al zoubi. „An evaluation of identity and access management systems“. International Journal of Internet Technology and Secured Transactions 11, Nr. 1 (2021): 35. http://dx.doi.org/10.1504/ijitst.2021.112868.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Adhirai, S., Paramjit Singh und R. P. Mahapatra. „Identity and access management using Boto and JSON“. International Journal of Engineering & Technology 7, Nr. 2.8 (19.03.2018): 640. http://dx.doi.org/10.14419/ijet.v7i2.8.10550.

Der volle Inhalt der Quelle
Annotation:
Cloud computing has emerged as the important data processing tool as it tackles exponential data growth. This, in turn, makes security something of a moving target. The National Institute of Standards and Technology (NIST), has declared the Identity and Access Management (IAM) as one of the major threats to the cloud computing. The Top Threats Working Group of Cloud Security Alliance (CSA) ranks “IAM” as the second topmost threat among twelve biggest threats in cloud computing. IAM allows the cloud server for managing the web services and herby allowing the users to manage the users and corresponding permissions (user policies). Other benefits posed by the IAM are central management ofusers, and maintain several security qualifications. This paper focuses on Managing IAM Users, and Working with IAM Policies using JavaScript Object Notation (JSON), and Boto. The paper concludes utmost care should be given to IAM user management and IAM user policies. It is the IAM Policies which play the sole role of ensuring security. If you don’t set up IAM policies properly, you will create security holes leading to security lapses.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Jalili, Vahid, Enis Afgan, James Taylor und Jeremy Goecks. „Cloud bursting galaxy: federated identity and access management“. Bioinformatics 36, Nr. 1 (14.06.2019): 1–9. http://dx.doi.org/10.1093/bioinformatics/btz472.

Der volle Inhalt der Quelle
Annotation:
Abstract Motivation Large biomedical datasets, such as those from genomics and imaging, are increasingly being stored on commercial and institutional cloud computing platforms. This is because cloud-scale computing resources, from robust backup to high-speed data transfer to scalable compute and storage, are needed to make these large datasets usable. However, one challenge for large-scale biomedical data on the cloud is providing secure access, especially when datasets are distributed across platforms. While there are open Web protocols for secure authentication and authorization, these protocols are not in wide use in bioinformatics and are difficult to use for even technologically sophisticated users. Results We have developed a generic and extensible approach for securely accessing biomedical datasets distributed across cloud computing platforms. Our approach combines OpenID Connect and OAuth2, best-practice Web protocols for authentication and authorization, together with Galaxy (https://galaxyproject.org), a web-based computational workbench used by thousands of scientists across the world. With our enhanced version of Galaxy, users can access and analyze data distributed across multiple cloud computing providers without any special knowledge of access/authorization protocols. Our approach does not require users to share permanent credentials (e.g. username, password, API key), instead relying on automatically generated temporary tokens that refresh as needed. Our approach is generalizable to most identity providers and cloud computing platforms. To the best of our knowledge, Galaxy is the only computational workbench where users can access biomedical datasets across multiple cloud computing platforms using best-practice Web security approaches and thereby minimize risks of unauthorized data access and credential use. Availability and implementation Freely available for academic and commercial use under the open-source Academic Free License (https://opensource.org/licenses/AFL-3.0) from the following Github repositories: https://github.com/galaxyproject/galaxy and https://github.com/galaxyproject/cloudauthz.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

S., Devlekar,, und Ramteke, V. „Identity and Access Management: High-level Conceptual Framework“. CARDIOMETRY, Nr. 24 (30.11.2022): 393–99. http://dx.doi.org/10.18137/cardiometry.2022.24.393399.

Der volle Inhalt der Quelle
Annotation:
Information security is shifting from a traditional perimeter-based approach to an identity-based approach where the organization’s boundaries are where their digital identities exist. The organization has multiple stakeholders having access to various organization resources. Systems and applications are part of organization resources that help them achieve their business goals. These systems and applications are internally or externally exposed to allow all stakeholders to have seamless access, thus making identity and access management a big challenge. Identity and Access Management (IAM) is a fundamental part of information security. It plays a critical role in keeping the organization’s information security posture resilient to cyber attacks. This paper will identify various components of an IAM solution that are essential and should be considered while implementing and assessing the IAM solution and provides a high-level IAM framework that will allow information security professionals to assess the IAM security posture of an organization.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Kifayat, Kashif, Sameeh Abdulghafour Jassim und Sufyan T. Faraj. „Management of Identity and Access in the Cloud“. Journal of University of Anbar for Pure Science 6, Nr. 2 (01.08.2012): 22–33. http://dx.doi.org/10.37652/juaps.2012.63234.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Godfrey, Duncan. „Layering identity and access management to disrupt attacks“. Network Security 2021, Nr. 11 (November 2021): 17–19. http://dx.doi.org/10.1016/s1353-4858(21)00133-1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

Wang, Shangping, Ru Pei und Yaling Zhang. „EIDM: A Ethereum-Based Cloud User Identity Management Protocol“. IEEE Access 7 (2019): 115281–91. http://dx.doi.org/10.1109/access.2019.2933989.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Kylänpää, Markku, und Jarno Salonen. „Combining System Integrity Verification with Identity and Access Management“. European Conference on Cyber Warfare and Security 21, Nr. 1 (08.06.2022): 140–49. http://dx.doi.org/10.34190/eccws.21.1.202.

Der volle Inhalt der Quelle
Annotation:
Digital transformation and the utilization of Industrial IoT (IIoT) introduces numerous interconnected devices to factories increasing among others the challenge of managing their software versions and giving attackers new possibilities to exploit various software vulnerabilities. Factory networks were earlier isolated from the Internet. However, this separation is no longer valid and there can be connections that allow intruders to penetrate into information systems of factories. Another issue is that although factories typically are physically isolated, it is not necessarily safe to assume that physical security is in good shape as the novel supply networks comprise subcontracted activities and temporary work force. Another threat can also arise from unauthorized monitoring of devices and the unauthorized replacement of existing ones. Based on the previous, it is crucial that IIoT security should be built into factories of the future (FoF) right from the design phase and even low-end devices need to be supported. Trusted computing concept called remote attestation should be used. Remote attestation allows remote parties to verify the integrity of each system component. System components should include trusted hardware components that can be used to measure executable software. The term measurement means calculating the cryptographic hash of the binary component before passing control to it. Trusted hardware components should also have a mechanism to protect the integrity of the measurement list and cryptographic keys that can be used to sign integrity assertions. The verifier part should have a storage of reference integrity metrics identifying the expected values of these measurements. Deploying trusted computing and remote attestation concepts to industrial automation is not straightforward. Even if it is possible to use remote attestation with suitable hardware components, it is not clear how remote attestation should be integrated with various operational technology (OT) industrial automation protocols. Approaches to use remote attestation with existing industrial automation protocols (e.g., OPC UA) is discussed. Advanced identity and access management (e.g., OAuth2, OpenID Connect) can be used to combine integrity measurements with device identity information so that the remote attestation process is triggered by authentication during the first transaction. The focus is on machine-to-machine (M2M) communications with immutable device identities and integrity evidence transfer.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Divyabharathi D. N. und Nagaraj G. Cholli. „A Review on Identity and Access Management Server (KeyCloak)“. International Journal of Security and Privacy in Pervasive Computing 12, Nr. 3 (Juli 2020): 46–53. http://dx.doi.org/10.4018/ijsppc.2020070104.

Der volle Inhalt der Quelle
Annotation:
KeyCloak is an open source identity and access management arrangement focused on present day applications and administrations. It makes it simple to protect applications and administrations with next to zero code. The identity and access management server component provides centralized user management, authentication, and single sign-on identity brokering user federation, social login, client adapters, an admin console, and an account management console for the applications. With KeyCloak, the user management and authentication functions may be integrated with an externally managed system, such as LDAP or active directory. KeyCloak provides single sign-on infrastructure for authentication and session management. In this paper, the authors present an overview of KeyCloak that gives the objectives and features of KeyCloak and comparisons between the servers. They also present protocols of KeyCloak. Finally, benefits of KeyCloak are defined.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Flieder, Karl. „Identity- und Access-Management mit EAI-Konzepten und -Technologien“. Datenschutz und Datensicherheit - DuD 32, Nr. 8 (August 2008): 532–36. http://dx.doi.org/10.1007/s11623-008-0126-4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

Gruschka, N., L. Lo Iacono und H. Rajasekaran. „Identity and access management in multi-institutional medical research“. e & i Elektrotechnik und Informationstechnik 127, Nr. 5 (Mai 2010): 143–50. http://dx.doi.org/10.1007/s00502-010-0734-1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

Pöhn, Daniela, und Wolfgang Hommel. „New Directions and Challenges within Identity and Access Management“. IEEE Communications Standards Magazine 7, Nr. 2 (Juni 2023): 84–90. http://dx.doi.org/10.1109/mcomstd.0006.2200077.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Moreno, Rafael Torres, Jesus Garcia-Rodriguez, Jorge Bernal Bernabe und Antonio Skarmeta. „A Trusted Approach for Decentralised and Privacy-Preserving Identity Management“. IEEE Access 9 (2021): 105788–804. http://dx.doi.org/10.1109/access.2021.3099837.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Astorga, Jasone, Marc Barcelo, Aitor Urbieta und Eduardo Jacob. „How to Survive Identity Management in the Industry 4.0 Era“. IEEE Access 9 (2021): 93137–51. http://dx.doi.org/10.1109/access.2021.3092203.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Fu, Zom Bo, Jian Xin Wang, Lin Yang, Yuan Cao und Wei Xing Zhu. „Open Problems for Privacy Preservation in Identity Management“. Applied Mechanics and Materials 40-41 (November 2010): 652–56. http://dx.doi.org/10.4028/www.scientific.net/amm.40-41.652.

Der volle Inhalt der Quelle
Annotation:
In Open Computing Environments, more and more applications are deployed as service. They provide services for users from different organizations. Resources are deployed different organizations or enterprises. Users could access them across organizational boundaries. To ensure the security of resources, users have to provide their identity information to be authorized correctly every time they access a new service. It raises the risk of privacy which identity information was transferred frequently. In this paper, we demonstrate the problem of privacy in Identity Management of open computing environments, discuss the risk of privacy.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

Nuruliansyah, Hendra. „Penerapan Privileged Access Management Menggunakan One Identity Pada Sebuah Perusahaan“. INOVA-TIF 2, Nr. 1 (02.01.2020): 12. http://dx.doi.org/10.32832/inova-tif.v1i2.2750.

Der volle Inhalt der Quelle
Annotation:
<p><em>One Identity Priveged Access Management (PAM) is a solution for a series of efforts to reduce security risks and help companies secure, control, monitor, analyze, and regulate privileged access rights to data and applications from very important organizations. The PAM solution allows companies to provide full credentials such as Administrators on Windows, Root on UNIX, Cisco Enable on Cisco devices, and embedded passwords found in applications and scripts or restricting access to ordinary users. All privileged account activities are recorded by analyzing real time activities and data. Password sharing activities can be eliminated, so security can be improved and compliance with privileges of privileged access rights is more efficient and manageable. Problems that can be explained when the user privileges password access rights do not have regular rules to change the password periodically in accordance with the security policy (password policy) even to obtain information that has accessed the network device using a special account or other permitted account . The purpose of this study is (i) to obtain information about changes in passwords periodically based on the configuration that has been set in the PAM system and adjusted to the password policy rules, (ii) get information about who is accessing the network device and the account accessed. The research method that is carried out is (i) collecting data from the system that will be implemented, (ii) directly accessing the system that has data and viewing information thoroughly into the system, (iii) matching the type of system with the system supported by the PAM application system then integrate it. Testing is done by accessing the target system using privileged access rights through the PAM application system. The results obtained (i) can facilitate password users not to remember passwords too often, (ii) can avoid sharing password information, (iii) change passwords regularly, (iv) find out all user password activities against a set of targets network systems that are permitted to be accessed, (v) record all access activities in the form of videos.</em></p>
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

Monson, Jane. „A Review of “Access and Identity Management for Libraries: Controlling Access to Online Information”“. Journal of Electronic Resources Librarianship 26, Nr. 3 (03.07.2014): 228–29. http://dx.doi.org/10.1080/1941126x.2014.939050.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Schorer, Craig. „A Review of “Access and Identity Management for Libraries: Controlling Access to Online Information”“. Journal of Access Services 11, Nr. 4 (02.10.2014): 327–28. http://dx.doi.org/10.1080/15367967.2014.945294.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

Dirgantara, Dhimas, und Is Mardianto. „TEKNIK IDENTITY AND ACCESS MANAGEMENT PADA LAYANAN AMAZON WEB SERVICES“. Computatio : Journal of Computer Science and Information Systems 3, Nr. 1 (18.06.2019): 1. http://dx.doi.org/10.24912/computatio.v3i1.4270.

Der volle Inhalt der Quelle
Annotation:
In this era, traditional technologies such as having servers and various kinds of hardware have been abandoned by large companies, which are turning to cloud computing technology. This technology makes it easier for companies to run their business. Of the many cloud computing service providers, Amazon Web Service (AWS) is one of the first and biggest service providers. Problems that occur in the use of cloud computing technology is the provision of access rights in data management. AWS has a service to manage access control for each service, namely Identity and Access Management (IAM). This service seeks to prevent activities that lead to security breaches. The results obtained are in the form of groups that can access AWS services according to the role given. Pada era ini, teknologi tradisional seperti memiliki server dan berbagai macam hardware telah ditinggalkan oleh perusahaan besar, yang beralih pada teknologi cloud computing. Teknologi ini memudahkan perusahaan dalam menjalankan bisnisnya. Dari banyaknya penyedia layanan cloud computing, Amazon Web Service (AWS) adalah salah satu penyedia layanan pertama dan yang terbesar. Masalah-masalah yang terjadi dalam penggunaan teknologi cloud computing adalah pemberian hak akses dalam melakukan manajemen data. AWS memiliki suatu layanan untuk mengatur kendali akses pada setiap layanan yaitu Identity and Access Management (IAM). Layanan ini berupaya mencegah aktivitas yang mengarah pada pelanggaran keamanan. Hasil yang didapatkan berupa group yang dapat mengakses layanan AWS sesuai dengan role yang diberikan.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Karim Abdul-Hassan, Alia, und Iman Hasson Hadi. „INTELLIGENT AUTHENTICATION FOR IDENTITY AND ACCESS MANAGEMENT: A REVIEW PAPER“. Iraqi Journal for Computers and informatics 45, Nr. 1 (08.12.2019): 6–10. http://dx.doi.org/10.25195/2017/4512.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Hadi, Iman. „INTELLIGENT AUTHENTICATION FOR IDENTITY AND ACCESS MANAGEMENT: A REVIEW PAPER“. Iraqi Journal for Computers and Informatics 45, Nr. 1 (01.05.2019): 6–10. http://dx.doi.org/10.25195/ijci.v45i1.39.

Der volle Inhalt der Quelle
Annotation:
Identity and access management (IAM) system usually consist of predefined tasks as an information security system. Themain task is the authentication, since it is responsible for user identity proving for service providers that corporate with (IAM).This paper provides a review on intelligent authentication research applicable to IAM systems. These researches areevaluated according to the proposal of intelligent authentication key factors. Depending on this evaluation it could not be foundresearch implement an authentication that satisfies all these key factors.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Aguado Corman, Asier, Daniel Fernández Rodríguez, Maria V. Georgiou, Julien Rische, Ioan Cristian Schuszter, Hannah Short und Paolo Tedesco. „CERN’s Identity and Access Management: A journey to Open Source“. EPJ Web of Conferences 245 (2020): 03012. http://dx.doi.org/10.1051/epjconf/202024503012.

Der volle Inhalt der Quelle
Annotation:
Until recently, CERN had been considered eligible for academic pricing of Microsoft products. Now, along with many other research institutes, CERN has been disqualified from this educational programme and faces a 20 fold increase in license costs. CERN’s current Authentication and Authorization Infrastructure, dating from 2008, comprises multiple Microsoft services from the web Single-Sign-On to the Accounts Database. Replacing these core components is an opportunity to rebuild the CERN infrastructure using the latest technologies and concepts and to respond to evolving requirements of the community. It is also the appropriate moment to consider the alignment of CERN’s and the Worldwide LHC Computing Grid’s approaches to identity management, to create a more consistent environment for operators, developers and users. 2019 saw the launch of an Alpha version of CERN’s next generation Authentication and Authorization Infrastructure, focusing on free and open source products and responding to the limitations experienced by the current system. We describe the new solution and focus on key changes.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Schanzenbach, Martin, und Sebastian Zickau. „Identity and access management in a doping control use case“. Datenschutz und Datensicherheit - DuD 41, Nr. 12 (Dezember 2017): 724–28. http://dx.doi.org/10.1007/s11623-017-0867-z.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Rasouli, Hatef, und Changiz Valmohammadi. „Proposing a conceptual framework for customer identity and access management“. Global Knowledge, Memory and Communication 69, Nr. 1/2 (29.07.2019): 94–116. http://dx.doi.org/10.1108/gkmc-02-2019-0014.

Der volle Inhalt der Quelle
Annotation:
Purpose Customer identity and access management (CIAM) is a sub-genre of traditional identity and access management (IAM) that has emerged in the past few years to meet evolving business requirements. CIAM focuses on the connectivity with the customer when accessing any type of systems, on-premises and in the cloud, from registration to track. The purpose of this study is to introduce different dimensions of CIAM toward exploiting them in organizations. Design/methodology/approach Based on a thorough review of the relevant literature and semi-structured interview with six experts in the field of digital IAM the necessary data were gathered. Then through the use of content analysis technique, analytic codes and also categories and sub-categories of the data were generated. Findings Results indicate that four categories, namely, customer identity management, customer access management and information technology and business management are the most important factors affecting the identification of CIAM dimensions. Originality/value Organizations could avail of the proposed conceptual model toward identification and offering customized products and services solutions to their customers.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

Indu, I., P. M. Rubesh Anand und Vidhyacharan Bhaskar. „Identity and access management in cloud environment: Mechanisms and challenges“. Engineering Science and Technology, an International Journal 21, Nr. 4 (August 2018): 574–88. http://dx.doi.org/10.1016/j.jestch.2018.05.010.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Nikhil Ghadge. „Enhancing threat detection in Identity and Access Management (IAM) systems“. International Journal of Science and Research Archive 11, Nr. 2 (30.04.2024): 2050–57. http://dx.doi.org/10.30574/ijsra.2024.11.2.0761.

Der volle Inhalt der Quelle
Annotation:
Identity and Access Management (IAM) systems play a pivotal role in safeguarding organizational resources by controlling access to sensitive information. However, these systems face evolving threats that can compromise security and privacy. This paper proposes a comprehensive approach to enhance threat detection within IAM systems. By integrating advanced techniques such as anomaly detection, machine learning, and behavior analysis, organizations can better identify and respond to suspicious activities. This paper discusses the challenges associated with threat detection in IAM systems and presents practical solutions to mitigate these risks. Furthermore, the paper highlights the importance of continuous monitoring and adaptation effectively combat emerging threats.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Singla, Ashish, Nakul Gupta, Prageet Aeron, Anshul Jain, Divya Sharma und Sangeeta Shah Bharadwaj. „Decentralized Identity Management Using Blockchain“. Journal of Global Information Management 31, Nr. 2 (29.12.2022): 1–24. http://dx.doi.org/10.4018/jgim.315283.

Der volle Inhalt der Quelle
Annotation:
This article explores the usage of decentralised identity (DID) management using blockchain in global organisations to support secure usage of information resources. Blockchain as technology was initially introduced as a cryptocurrency and there have been challenges in its adoption for enterprise applications such as identity management. DID is emerging as one of the strong blockchain adoption use cases. Industry pioneers and users across domains have started exploring DID use cases, which help better protect their personal data and application access control as compared to traditional, central, or federated identity management models. In this exploratory work, the authors employ qualitative secondary case-based study research methodology to understand the challenges of the current digital identity management landscape and explore the possible benefits of DID as an emerging identity management paradigm. They propose a conceptual cube framework for analysing and studying various DID platforms thereby contributing to both the theory and practice of digitally secure identity.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie