Journal articles on the topic 'Identity access management'

To see the other types of publications on this topic, follow the link: Identity access management.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Identity access management.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Pol, Mr Vinay Jayprakash. "Identity and Access Management Tools." International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (June 30, 2019): 796–98. http://dx.doi.org/10.31142/ijtsrd23935.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Uddin, Mumina, and David Preston. "Systematic Review of Identity Access Management in Information Security." Journal of Advances in Computer Networks 3, no. 2 (2015): 150–56. http://dx.doi.org/10.7763/jacn.2015.v3.158.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Carnley, P. Renee, and Houssain Kettani. "Identity and Access Management for the Internet of Things." International Journal of Future Computer and Communication 8, no. 4 (December 2019): 129–33. http://dx.doi.org/10.18178/ijfcc.2019.8.4.554.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kumar, Vikas, and Aashish Bhardwaj. "Identity Management Systems." International Journal of Strategic Decision Sciences 9, no. 1 (January 2018): 63–78. http://dx.doi.org/10.4018/ijsds.2018010105.

Full text
Abstract:
This article describes how in today's digital world, customers have made it a common practice to maintain user accounts with different service providers to access a range of services. In such environment, all attributes of the identity must be verified to operate, otherwise the resources would be vulnerable to financial and data loss. This article contends that makes it important to form an Identity Management System, which could provide central administration, user self- service, role based access control and integrated user management. Identity Management becomes very much vital for the environment working with multiple technologies, as it governs an entity (i.e. a human or a software agent) to authenticate and authorize for accessing the network via multiple technologies. Successful Identity Management increases the efficiency, security, access control and decreases the complexity, cost and many repetitive works. Essential features of present day identity management systems have been identified in the present work. A comparative analysis of these identity management systems has been carried out to establish the present-day industry practices. Along with that, specific challenges to the present-day identity management systems have been identified. The article helps in the identification of suitable Identity Management System for specific applications.
APA, Harvard, Vancouver, ISO, and other styles
5

Jin, Qiang, and Deren Kudeki. "Identity and Access Management for Libraries." Technical Services Quarterly 36, no. 1 (January 2, 2019): 44–60. http://dx.doi.org/10.1080/07317131.2018.1532056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Fuchs, Ludwig, and Günther Pernul. "Qualitätssicherung im Identity- und Access Management." HMD Praxis der Wirtschaftsinformatik 50, no. 1 (February 2013): 88–97. http://dx.doi.org/10.1007/bf03340780.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Pawar, Pratik. "KeyHound - Identity Provider and Access Management." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (April 9, 2024): 1–5. http://dx.doi.org/10.55041/ijsrem30444.

Full text
Abstract:
Single organization handles multiple applications based on different departments or needs. To access these applications, users must remember the login credentials for each. This results in the data of mutual users being stored in different identity providers, causing data redundancy and indirectly increasing storage costs. Solution is needed to globalize user credentials. Implementing a centralized system aids organizations in saving storage costs by eliminating redundant user data stored across multiple identity providers. Key Words: Identity provider and Management, Access management, Validation, Authorization.
APA, Harvard, Vancouver, ISO, and other styles
8

Martin, Luther. "Identity-based Encryption: From Identity and Access Management to Enterprise Privacy Management." Information Systems Security 16, no. 1 (March 28, 2007): 9–14. http://dx.doi.org/10.1080/10658980601051268.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Saloni Kumari. "Identity and access management: "Elevating security and efficiency: Unveiling the crucial aspects of identity and access management”." International Journal of Engineering & Technology 12, no. 1 (September 6, 2023): 11–14. http://dx.doi.org/10.14419/ijet.v12i1.32333.

Full text
Abstract:
The foundation of the software is the identity and access management system. A fundamental and essential cybersecurity competency is ensuring that the right parties have timely access to the right resources. The IAM has four domains: IAAA stands for identification, authentication, authorization, and accounting, the second is Privileged Access Management (PAM), third-party Identity Governance and Administration, data governance and protection. In this article, the concepts of identification, authentication, authorization, and accounting are discussed, as well as how IAAA works in an online setting.
APA, Harvard, Vancouver, ISO, and other styles
10

Dhamdhere, Mayuri, Shridevi Karande, and Madhura Phatak. "Peer Group Analysis in Identity and Access Management to Identify Anomalies." International Journal of Engineering and Technology 9, no. 3S (July 17, 2017): 116–21. http://dx.doi.org/10.21817/ijet/2017/v9i3/170903s020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Kunz, Michael, Alexander Puchta, Sebastian Groll, Ludwig Fuchs, and Günther Pernul. "Attribute quality management for dynamic identity and access management." Journal of Information Security and Applications 44 (February 2019): 64–79. http://dx.doi.org/10.1016/j.jisa.2018.11.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Goth, G. "Identity management, access specs are rolling along." IEEE Internet Computing 9, no. 1 (January 2005): 9–11. http://dx.doi.org/10.1109/mic.2005.16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Everett, Cath. "Identity and Access Management: the second wave." Computer Fraud & Security 2011, no. 5 (May 2011): 11–13. http://dx.doi.org/10.1016/s1361-3723(11)70051-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Varma, Hardik. "Identity Access Management (IAM), Privilege Access Management (PAM) & Security Operation Center (SOC)." International Journal for Research in Applied Science and Engineering Technology 9, no. 11 (November 30, 2021): 1460–66. http://dx.doi.org/10.22214/ijraset.2021.39029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Crnic, Josipa. "Access and Identity Management for Libraries: Controlling Access to Online Information." Australian Academic & Research Libraries 46, no. 1 (January 2, 2015): 64–65. http://dx.doi.org/10.1080/00048623.2014.993451.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Maclean, Lesa. "Access and identity management for libraries: Controlling access to online information." Australian Library Journal 64, no. 1 (January 2, 2015): 57. http://dx.doi.org/10.1080/00049670.2014.988841.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Lodwick, David. "Access and Identity Management for Libraries: Controlling Access to Online Information." Technical Services Quarterly 32, no. 1 (December 17, 2014): 112–13. http://dx.doi.org/10.1080/07317131.2015.972909.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Gunter, Carl, David Liebovitz, and Bradley Malin. "Experience-Based Access Management: A Life-Cycle Framework for Identity and Access Management Systems." IEEE Security & Privacy Magazine 9, no. 5 (September 2011): 48–55. http://dx.doi.org/10.1109/msp.2011.72.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Ahmed, Md Rayhan, A. K. M. Muzahidul Islam, Swakkhar Shatabda, and Salekul Islam. "Blockchain-Based Identity Management System and Self-Sovereign Identity Ecosystem: A Comprehensive Survey." IEEE Access 10 (2022): 113436–81. http://dx.doi.org/10.1109/access.2022.3216643.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Chunduru, Anilkumar, and Sumathy S. "Security strategies for cloud identity management - a study." International Journal of Engineering & Technology 7, no. 2 (May 12, 2018): 732. http://dx.doi.org/10.14419/ijet.v7i2.10410.

Full text
Abstract:
Emphasis on security for providing Access Control in Cloud computing environment plays a significant role. Cloud computing provides number of benefits such as resource sharing, low speculation and large storage space. Huge amount of information stored in cloud can be accessed from anywhere, anytime on pay-per use basis. Resources in cloud should be accessed only by the authorized clients. Access Control in cloud computing has become a critical issue due to increasing number of users experiencing dynamic changes. Authentication, authorization and approval of the access ensuring liability of entities from login credentials including passwords and biometric scan is essential. Also, the federated authentication management is secured. Current approaches require large-scale distributed access control in cloud environment. Data security and access control are the drawbacks in existing access control schemes. Due to the drawbacks in existing access control schemes such as privacy of information when susceptible information is stored in intermediary service provider a federated identity access management is essential. Access control applications majorly concentrate on Healthcare, Government Organizations, Commercial, Critical Infrastructure and Financial Institutions. This review illustrates a detailed study of access control models in cloud computing and various cloud identity management schemes.
APA, Harvard, Vancouver, ISO, and other styles
21

Al zoubi, Qusay M., Yousef K. Sanjalawe, and Mohammed Anbar. "An evaluation of identity and access management systems." International Journal of Internet Technology and Secured Transactions 11, no. 1 (2021): 35. http://dx.doi.org/10.1504/ijitst.2021.10035182.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Duggal, Ashmeet Kaur, and Meenu Dave Dr. "INTELLIGENT IDENTITY AND ACCESS MANAGEMENT USING NEURAL NETWORKS." Indian Journal of Computer Science and Engineering 12, no. 1 (February 20, 2021): 47–56. http://dx.doi.org/10.21817/indjcse/2021/v12i1/211201154.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Devlekar, Sanket, and Vidyavati Ramteke. "Identity and Access Management: High-level Conceptual Framework." Revista Gestão Inovação e Tecnologias 11, no. 4 (August 24, 2021): 4885–97. http://dx.doi.org/10.47059/revistageintec.v11i4.2511.

Full text
Abstract:
Information security is shifting from a traditional perimeter-based approach to an identity-based approach where the organization's boundaries are where their digital identities exist. The organization has multiple stakeholders having access to various organization resources. Systems and applications are part of organization resources that help them achieve their business goals. These systems and applications are internally or externally exposed to allow all stakeholders to have seamless access, thus making identity and access management a big challenge. Identity and Access Management (IAM) is a fundamental part of information security. It plays a critical role in keeping the organization's information security posture resilient to cyber attacks. This paper will identify various components of an IAM solution that are essential and should be considered while implementing and assessing the IAM solution and provides a high-level IAM framework that will allow information security professionals to assess the IAM security posture of an organization.
APA, Harvard, Vancouver, ISO, and other styles
24

Sanjalawe, Yousef K., Mohammed Anbar, and Qusay M. Al zoubi. "An evaluation of identity and access management systems." International Journal of Internet Technology and Secured Transactions 11, no. 1 (2021): 35. http://dx.doi.org/10.1504/ijitst.2021.112868.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Adhirai, S., Paramjit Singh, and R. P. Mahapatra. "Identity and access management using Boto and JSON." International Journal of Engineering & Technology 7, no. 2.8 (March 19, 2018): 640. http://dx.doi.org/10.14419/ijet.v7i2.8.10550.

Full text
Abstract:
Cloud computing has emerged as the important data processing tool as it tackles exponential data growth. This, in turn, makes security something of a moving target. The National Institute of Standards and Technology (NIST), has declared the Identity and Access Management (IAM) as one of the major threats to the cloud computing. The Top Threats Working Group of Cloud Security Alliance (CSA) ranks “IAM” as the second topmost threat among twelve biggest threats in cloud computing. IAM allows the cloud server for managing the web services and herby allowing the users to manage the users and corresponding permissions (user policies). Other benefits posed by the IAM are central management ofusers, and maintain several security qualifications. This paper focuses on Managing IAM Users, and Working with IAM Policies using JavaScript Object Notation (JSON), and Boto. The paper concludes utmost care should be given to IAM user management and IAM user policies. It is the IAM Policies which play the sole role of ensuring security. If you don’t set up IAM policies properly, you will create security holes leading to security lapses.
APA, Harvard, Vancouver, ISO, and other styles
26

Jalili, Vahid, Enis Afgan, James Taylor, and Jeremy Goecks. "Cloud bursting galaxy: federated identity and access management." Bioinformatics 36, no. 1 (June 14, 2019): 1–9. http://dx.doi.org/10.1093/bioinformatics/btz472.

Full text
Abstract:
Abstract Motivation Large biomedical datasets, such as those from genomics and imaging, are increasingly being stored on commercial and institutional cloud computing platforms. This is because cloud-scale computing resources, from robust backup to high-speed data transfer to scalable compute and storage, are needed to make these large datasets usable. However, one challenge for large-scale biomedical data on the cloud is providing secure access, especially when datasets are distributed across platforms. While there are open Web protocols for secure authentication and authorization, these protocols are not in wide use in bioinformatics and are difficult to use for even technologically sophisticated users. Results We have developed a generic and extensible approach for securely accessing biomedical datasets distributed across cloud computing platforms. Our approach combines OpenID Connect and OAuth2, best-practice Web protocols for authentication and authorization, together with Galaxy (https://galaxyproject.org), a web-based computational workbench used by thousands of scientists across the world. With our enhanced version of Galaxy, users can access and analyze data distributed across multiple cloud computing providers without any special knowledge of access/authorization protocols. Our approach does not require users to share permanent credentials (e.g. username, password, API key), instead relying on automatically generated temporary tokens that refresh as needed. Our approach is generalizable to most identity providers and cloud computing platforms. To the best of our knowledge, Galaxy is the only computational workbench where users can access biomedical datasets across multiple cloud computing platforms using best-practice Web security approaches and thereby minimize risks of unauthorized data access and credential use. Availability and implementation Freely available for academic and commercial use under the open-source Academic Free License (https://opensource.org/licenses/AFL-3.0) from the following Github repositories: https://github.com/galaxyproject/galaxy and https://github.com/galaxyproject/cloudauthz.
APA, Harvard, Vancouver, ISO, and other styles
27

S., Devlekar,, and Ramteke, V. "Identity and Access Management: High-level Conceptual Framework." CARDIOMETRY, no. 24 (November 30, 2022): 393–99. http://dx.doi.org/10.18137/cardiometry.2022.24.393399.

Full text
Abstract:
Information security is shifting from a traditional perimeter-based approach to an identity-based approach where the organization’s boundaries are where their digital identities exist. The organization has multiple stakeholders having access to various organization resources. Systems and applications are part of organization resources that help them achieve their business goals. These systems and applications are internally or externally exposed to allow all stakeholders to have seamless access, thus making identity and access management a big challenge. Identity and Access Management (IAM) is a fundamental part of information security. It plays a critical role in keeping the organization’s information security posture resilient to cyber attacks. This paper will identify various components of an IAM solution that are essential and should be considered while implementing and assessing the IAM solution and provides a high-level IAM framework that will allow information security professionals to assess the IAM security posture of an organization.
APA, Harvard, Vancouver, ISO, and other styles
28

Kifayat, Kashif, Sameeh Abdulghafour Jassim, and Sufyan T. Faraj. "Management of Identity and Access in the Cloud." Journal of University of Anbar for Pure Science 6, no. 2 (August 1, 2012): 22–33. http://dx.doi.org/10.37652/juaps.2012.63234.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Godfrey, Duncan. "Layering identity and access management to disrupt attacks." Network Security 2021, no. 11 (November 2021): 17–19. http://dx.doi.org/10.1016/s1353-4858(21)00133-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Wang, Shangping, Ru Pei, and Yaling Zhang. "EIDM: A Ethereum-Based Cloud User Identity Management Protocol." IEEE Access 7 (2019): 115281–91. http://dx.doi.org/10.1109/access.2019.2933989.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Kylänpää, Markku, and Jarno Salonen. "Combining System Integrity Verification with Identity and Access Management." European Conference on Cyber Warfare and Security 21, no. 1 (June 8, 2022): 140–49. http://dx.doi.org/10.34190/eccws.21.1.202.

Full text
Abstract:
Digital transformation and the utilization of Industrial IoT (IIoT) introduces numerous interconnected devices to factories increasing among others the challenge of managing their software versions and giving attackers new possibilities to exploit various software vulnerabilities. Factory networks were earlier isolated from the Internet. However, this separation is no longer valid and there can be connections that allow intruders to penetrate into information systems of factories. Another issue is that although factories typically are physically isolated, it is not necessarily safe to assume that physical security is in good shape as the novel supply networks comprise subcontracted activities and temporary work force. Another threat can also arise from unauthorized monitoring of devices and the unauthorized replacement of existing ones. Based on the previous, it is crucial that IIoT security should be built into factories of the future (FoF) right from the design phase and even low-end devices need to be supported. Trusted computing concept called remote attestation should be used. Remote attestation allows remote parties to verify the integrity of each system component. System components should include trusted hardware components that can be used to measure executable software. The term measurement means calculating the cryptographic hash of the binary component before passing control to it. Trusted hardware components should also have a mechanism to protect the integrity of the measurement list and cryptographic keys that can be used to sign integrity assertions. The verifier part should have a storage of reference integrity metrics identifying the expected values of these measurements. Deploying trusted computing and remote attestation concepts to industrial automation is not straightforward. Even if it is possible to use remote attestation with suitable hardware components, it is not clear how remote attestation should be integrated with various operational technology (OT) industrial automation protocols. Approaches to use remote attestation with existing industrial automation protocols (e.g., OPC UA) is discussed. Advanced identity and access management (e.g., OAuth2, OpenID Connect) can be used to combine integrity measurements with device identity information so that the remote attestation process is triggered by authentication during the first transaction. The focus is on machine-to-machine (M2M) communications with immutable device identities and integrity evidence transfer.
APA, Harvard, Vancouver, ISO, and other styles
32

Divyabharathi D. N. and Nagaraj G. Cholli. "A Review on Identity and Access Management Server (KeyCloak)." International Journal of Security and Privacy in Pervasive Computing 12, no. 3 (July 2020): 46–53. http://dx.doi.org/10.4018/ijsppc.2020070104.

Full text
Abstract:
KeyCloak is an open source identity and access management arrangement focused on present day applications and administrations. It makes it simple to protect applications and administrations with next to zero code. The identity and access management server component provides centralized user management, authentication, and single sign-on identity brokering user federation, social login, client adapters, an admin console, and an account management console for the applications. With KeyCloak, the user management and authentication functions may be integrated with an externally managed system, such as LDAP or active directory. KeyCloak provides single sign-on infrastructure for authentication and session management. In this paper, the authors present an overview of KeyCloak that gives the objectives and features of KeyCloak and comparisons between the servers. They also present protocols of KeyCloak. Finally, benefits of KeyCloak are defined.
APA, Harvard, Vancouver, ISO, and other styles
33

Flieder, Karl. "Identity- und Access-Management mit EAI-Konzepten und -Technologien." Datenschutz und Datensicherheit - DuD 32, no. 8 (August 2008): 532–36. http://dx.doi.org/10.1007/s11623-008-0126-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Gruschka, N., L. Lo Iacono, and H. Rajasekaran. "Identity and access management in multi-institutional medical research." e & i Elektrotechnik und Informationstechnik 127, no. 5 (May 2010): 143–50. http://dx.doi.org/10.1007/s00502-010-0734-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Pöhn, Daniela, and Wolfgang Hommel. "New Directions and Challenges within Identity and Access Management." IEEE Communications Standards Magazine 7, no. 2 (June 2023): 84–90. http://dx.doi.org/10.1109/mcomstd.0006.2200077.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Moreno, Rafael Torres, Jesus Garcia-Rodriguez, Jorge Bernal Bernabe, and Antonio Skarmeta. "A Trusted Approach for Decentralised and Privacy-Preserving Identity Management." IEEE Access 9 (2021): 105788–804. http://dx.doi.org/10.1109/access.2021.3099837.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Astorga, Jasone, Marc Barcelo, Aitor Urbieta, and Eduardo Jacob. "How to Survive Identity Management in the Industry 4.0 Era." IEEE Access 9 (2021): 93137–51. http://dx.doi.org/10.1109/access.2021.3092203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Fu, Zom Bo, Jian Xin Wang, Lin Yang, Yuan Cao, and Wei Xing Zhu. "Open Problems for Privacy Preservation in Identity Management." Applied Mechanics and Materials 40-41 (November 2010): 652–56. http://dx.doi.org/10.4028/www.scientific.net/amm.40-41.652.

Full text
Abstract:
In Open Computing Environments, more and more applications are deployed as service. They provide services for users from different organizations. Resources are deployed different organizations or enterprises. Users could access them across organizational boundaries. To ensure the security of resources, users have to provide their identity information to be authorized correctly every time they access a new service. It raises the risk of privacy which identity information was transferred frequently. In this paper, we demonstrate the problem of privacy in Identity Management of open computing environments, discuss the risk of privacy.
APA, Harvard, Vancouver, ISO, and other styles
39

Nuruliansyah, Hendra. "Penerapan Privileged Access Management Menggunakan One Identity Pada Sebuah Perusahaan." INOVA-TIF 2, no. 1 (January 2, 2020): 12. http://dx.doi.org/10.32832/inova-tif.v1i2.2750.

Full text
Abstract:
<p><em>One Identity Priveged Access Management (PAM) is a solution for a series of efforts to reduce security risks and help companies secure, control, monitor, analyze, and regulate privileged access rights to data and applications from very important organizations. The PAM solution allows companies to provide full credentials such as Administrators on Windows, Root on UNIX, Cisco Enable on Cisco devices, and embedded passwords found in applications and scripts or restricting access to ordinary users. All privileged account activities are recorded by analyzing real time activities and data. Password sharing activities can be eliminated, so security can be improved and compliance with privileges of privileged access rights is more efficient and manageable. Problems that can be explained when the user privileges password access rights do not have regular rules to change the password periodically in accordance with the security policy (password policy) even to obtain information that has accessed the network device using a special account or other permitted account . The purpose of this study is (i) to obtain information about changes in passwords periodically based on the configuration that has been set in the PAM system and adjusted to the password policy rules, (ii) get information about who is accessing the network device and the account accessed. The research method that is carried out is (i) collecting data from the system that will be implemented, (ii) directly accessing the system that has data and viewing information thoroughly into the system, (iii) matching the type of system with the system supported by the PAM application system then integrate it. Testing is done by accessing the target system using privileged access rights through the PAM application system. The results obtained (i) can facilitate password users not to remember passwords too often, (ii) can avoid sharing password information, (iii) change passwords regularly, (iv) find out all user password activities against a set of targets network systems that are permitted to be accessed, (v) record all access activities in the form of videos.</em></p>
APA, Harvard, Vancouver, ISO, and other styles
40

Monson, Jane. "A Review of “Access and Identity Management for Libraries: Controlling Access to Online Information”." Journal of Electronic Resources Librarianship 26, no. 3 (July 3, 2014): 228–29. http://dx.doi.org/10.1080/1941126x.2014.939050.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Schorer, Craig. "A Review of “Access and Identity Management for Libraries: Controlling Access to Online Information”." Journal of Access Services 11, no. 4 (October 2, 2014): 327–28. http://dx.doi.org/10.1080/15367967.2014.945294.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Dirgantara, Dhimas, and Is Mardianto. "TEKNIK IDENTITY AND ACCESS MANAGEMENT PADA LAYANAN AMAZON WEB SERVICES." Computatio : Journal of Computer Science and Information Systems 3, no. 1 (June 18, 2019): 1. http://dx.doi.org/10.24912/computatio.v3i1.4270.

Full text
Abstract:
In this era, traditional technologies such as having servers and various kinds of hardware have been abandoned by large companies, which are turning to cloud computing technology. This technology makes it easier for companies to run their business. Of the many cloud computing service providers, Amazon Web Service (AWS) is one of the first and biggest service providers. Problems that occur in the use of cloud computing technology is the provision of access rights in data management. AWS has a service to manage access control for each service, namely Identity and Access Management (IAM). This service seeks to prevent activities that lead to security breaches. The results obtained are in the form of groups that can access AWS services according to the role given. Pada era ini, teknologi tradisional seperti memiliki server dan berbagai macam hardware telah ditinggalkan oleh perusahaan besar, yang beralih pada teknologi cloud computing. Teknologi ini memudahkan perusahaan dalam menjalankan bisnisnya. Dari banyaknya penyedia layanan cloud computing, Amazon Web Service (AWS) adalah salah satu penyedia layanan pertama dan yang terbesar. Masalah-masalah yang terjadi dalam penggunaan teknologi cloud computing adalah pemberian hak akses dalam melakukan manajemen data. AWS memiliki suatu layanan untuk mengatur kendali akses pada setiap layanan yaitu Identity and Access Management (IAM). Layanan ini berupaya mencegah aktivitas yang mengarah pada pelanggaran keamanan. Hasil yang didapatkan berupa group yang dapat mengakses layanan AWS sesuai dengan role yang diberikan.
APA, Harvard, Vancouver, ISO, and other styles
43

Karim Abdul-Hassan, Alia, and Iman Hasson Hadi. "INTELLIGENT AUTHENTICATION FOR IDENTITY AND ACCESS MANAGEMENT: A REVIEW PAPER." Iraqi Journal for Computers and informatics 45, no. 1 (December 8, 2019): 6–10. http://dx.doi.org/10.25195/2017/4512.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Hadi, Iman. "INTELLIGENT AUTHENTICATION FOR IDENTITY AND ACCESS MANAGEMENT: A REVIEW PAPER." Iraqi Journal for Computers and Informatics 45, no. 1 (May 1, 2019): 6–10. http://dx.doi.org/10.25195/ijci.v45i1.39.

Full text
Abstract:
Identity and access management (IAM) system usually consist of predefined tasks as an information security system. Themain task is the authentication, since it is responsible for user identity proving for service providers that corporate with (IAM).This paper provides a review on intelligent authentication research applicable to IAM systems. These researches areevaluated according to the proposal of intelligent authentication key factors. Depending on this evaluation it could not be foundresearch implement an authentication that satisfies all these key factors.
APA, Harvard, Vancouver, ISO, and other styles
45

Aguado Corman, Asier, Daniel Fernández Rodríguez, Maria V. Georgiou, Julien Rische, Ioan Cristian Schuszter, Hannah Short, and Paolo Tedesco. "CERN’s Identity and Access Management: A journey to Open Source." EPJ Web of Conferences 245 (2020): 03012. http://dx.doi.org/10.1051/epjconf/202024503012.

Full text
Abstract:
Until recently, CERN had been considered eligible for academic pricing of Microsoft products. Now, along with many other research institutes, CERN has been disqualified from this educational programme and faces a 20 fold increase in license costs. CERN’s current Authentication and Authorization Infrastructure, dating from 2008, comprises multiple Microsoft services from the web Single-Sign-On to the Accounts Database. Replacing these core components is an opportunity to rebuild the CERN infrastructure using the latest technologies and concepts and to respond to evolving requirements of the community. It is also the appropriate moment to consider the alignment of CERN’s and the Worldwide LHC Computing Grid’s approaches to identity management, to create a more consistent environment for operators, developers and users. 2019 saw the launch of an Alpha version of CERN’s next generation Authentication and Authorization Infrastructure, focusing on free and open source products and responding to the limitations experienced by the current system. We describe the new solution and focus on key changes.
APA, Harvard, Vancouver, ISO, and other styles
46

Schanzenbach, Martin, and Sebastian Zickau. "Identity and access management in a doping control use case." Datenschutz und Datensicherheit - DuD 41, no. 12 (December 2017): 724–28. http://dx.doi.org/10.1007/s11623-017-0867-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Rasouli, Hatef, and Changiz Valmohammadi. "Proposing a conceptual framework for customer identity and access management." Global Knowledge, Memory and Communication 69, no. 1/2 (July 29, 2019): 94–116. http://dx.doi.org/10.1108/gkmc-02-2019-0014.

Full text
Abstract:
Purpose Customer identity and access management (CIAM) is a sub-genre of traditional identity and access management (IAM) that has emerged in the past few years to meet evolving business requirements. CIAM focuses on the connectivity with the customer when accessing any type of systems, on-premises and in the cloud, from registration to track. The purpose of this study is to introduce different dimensions of CIAM toward exploiting them in organizations. Design/methodology/approach Based on a thorough review of the relevant literature and semi-structured interview with six experts in the field of digital IAM the necessary data were gathered. Then through the use of content analysis technique, analytic codes and also categories and sub-categories of the data were generated. Findings Results indicate that four categories, namely, customer identity management, customer access management and information technology and business management are the most important factors affecting the identification of CIAM dimensions. Originality/value Organizations could avail of the proposed conceptual model toward identification and offering customized products and services solutions to their customers.
APA, Harvard, Vancouver, ISO, and other styles
48

Indu, I., P. M. Rubesh Anand, and Vidhyacharan Bhaskar. "Identity and access management in cloud environment: Mechanisms and challenges." Engineering Science and Technology, an International Journal 21, no. 4 (August 2018): 574–88. http://dx.doi.org/10.1016/j.jestch.2018.05.010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Nikhil Ghadge. "Enhancing threat detection in Identity and Access Management (IAM) systems." International Journal of Science and Research Archive 11, no. 2 (April 30, 2024): 2050–57. http://dx.doi.org/10.30574/ijsra.2024.11.2.0761.

Full text
Abstract:
Identity and Access Management (IAM) systems play a pivotal role in safeguarding organizational resources by controlling access to sensitive information. However, these systems face evolving threats that can compromise security and privacy. This paper proposes a comprehensive approach to enhance threat detection within IAM systems. By integrating advanced techniques such as anomaly detection, machine learning, and behavior analysis, organizations can better identify and respond to suspicious activities. This paper discusses the challenges associated with threat detection in IAM systems and presents practical solutions to mitigate these risks. Furthermore, the paper highlights the importance of continuous monitoring and adaptation effectively combat emerging threats.
APA, Harvard, Vancouver, ISO, and other styles
50

Singla, Ashish, Nakul Gupta, Prageet Aeron, Anshul Jain, Divya Sharma, and Sangeeta Shah Bharadwaj. "Decentralized Identity Management Using Blockchain." Journal of Global Information Management 31, no. 2 (December 29, 2022): 1–24. http://dx.doi.org/10.4018/jgim.315283.

Full text
Abstract:
This article explores the usage of decentralised identity (DID) management using blockchain in global organisations to support secure usage of information resources. Blockchain as technology was initially introduced as a cryptocurrency and there have been challenges in its adoption for enterprise applications such as identity management. DID is emerging as one of the strong blockchain adoption use cases. Industry pioneers and users across domains have started exploring DID use cases, which help better protect their personal data and application access control as compared to traditional, central, or federated identity management models. In this exploratory work, the authors employ qualitative secondary case-based study research methodology to understand the challenges of the current digital identity management landscape and explore the possible benefits of DID as an emerging identity management paradigm. They propose a conceptual cube framework for analysing and studying various DID platforms thereby contributing to both the theory and practice of digitally secure identity.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography