Siga este enlace para ver otros tipos de publicaciones sobre el tema: Identity access management.

Artículos de revistas sobre el tema "Identity access management"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Identity access management".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Pol, Mr Vinay Jayprakash. "Identity and Access Management Tools". International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (30 de junio de 2019): 796–98. http://dx.doi.org/10.31142/ijtsrd23935.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Uddin, Mumina y David Preston. "Systematic Review of Identity Access Management in Information Security". Journal of Advances in Computer Networks 3, n.º 2 (2015): 150–56. http://dx.doi.org/10.7763/jacn.2015.v3.158.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Carnley, P. Renee y Houssain Kettani. "Identity and Access Management for the Internet of Things". International Journal of Future Computer and Communication 8, n.º 4 (diciembre de 2019): 129–33. http://dx.doi.org/10.18178/ijfcc.2019.8.4.554.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Kumar, Vikas y Aashish Bhardwaj. "Identity Management Systems". International Journal of Strategic Decision Sciences 9, n.º 1 (enero de 2018): 63–78. http://dx.doi.org/10.4018/ijsds.2018010105.

Texto completo
Resumen
This article describes how in today's digital world, customers have made it a common practice to maintain user accounts with different service providers to access a range of services. In such environment, all attributes of the identity must be verified to operate, otherwise the resources would be vulnerable to financial and data loss. This article contends that makes it important to form an Identity Management System, which could provide central administration, user self- service, role based access control and integrated user management. Identity Management becomes very much vital for the environment working with multiple technologies, as it governs an entity (i.e. a human or a software agent) to authenticate and authorize for accessing the network via multiple technologies. Successful Identity Management increases the efficiency, security, access control and decreases the complexity, cost and many repetitive works. Essential features of present day identity management systems have been identified in the present work. A comparative analysis of these identity management systems has been carried out to establish the present-day industry practices. Along with that, specific challenges to the present-day identity management systems have been identified. The article helps in the identification of suitable Identity Management System for specific applications.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Jin, Qiang y Deren Kudeki. "Identity and Access Management for Libraries". Technical Services Quarterly 36, n.º 1 (2 de enero de 2019): 44–60. http://dx.doi.org/10.1080/07317131.2018.1532056.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Fuchs, Ludwig y Günther Pernul. "Qualitätssicherung im Identity- und Access Management". HMD Praxis der Wirtschaftsinformatik 50, n.º 1 (febrero de 2013): 88–97. http://dx.doi.org/10.1007/bf03340780.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Pawar, Pratik. "KeyHound - Identity Provider and Access Management". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n.º 04 (9 de abril de 2024): 1–5. http://dx.doi.org/10.55041/ijsrem30444.

Texto completo
Resumen
Single organization handles multiple applications based on different departments or needs. To access these applications, users must remember the login credentials for each. This results in the data of mutual users being stored in different identity providers, causing data redundancy and indirectly increasing storage costs. Solution is needed to globalize user credentials. Implementing a centralized system aids organizations in saving storage costs by eliminating redundant user data stored across multiple identity providers. Key Words: Identity provider and Management, Access management, Validation, Authorization.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Martin, Luther. "Identity-based Encryption: From Identity and Access Management to Enterprise Privacy Management". Information Systems Security 16, n.º 1 (28 de marzo de 2007): 9–14. http://dx.doi.org/10.1080/10658980601051268.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Saloni Kumari. "Identity and access management: "Elevating security and efficiency: Unveiling the crucial aspects of identity and access management”". International Journal of Engineering & Technology 12, n.º 1 (6 de septiembre de 2023): 11–14. http://dx.doi.org/10.14419/ijet.v12i1.32333.

Texto completo
Resumen
The foundation of the software is the identity and access management system. A fundamental and essential cybersecurity competency is ensuring that the right parties have timely access to the right resources. The IAM has four domains: IAAA stands for identification, authentication, authorization, and accounting, the second is Privileged Access Management (PAM), third-party Identity Governance and Administration, data governance and protection. In this article, the concepts of identification, authentication, authorization, and accounting are discussed, as well as how IAAA works in an online setting.
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Dhamdhere, Mayuri, Shridevi Karande y Madhura Phatak. "Peer Group Analysis in Identity and Access Management to Identify Anomalies". International Journal of Engineering and Technology 9, n.º 3S (17 de julio de 2017): 116–21. http://dx.doi.org/10.21817/ijet/2017/v9i3/170903s020.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Kunz, Michael, Alexander Puchta, Sebastian Groll, Ludwig Fuchs y Günther Pernul. "Attribute quality management for dynamic identity and access management". Journal of Information Security and Applications 44 (febrero de 2019): 64–79. http://dx.doi.org/10.1016/j.jisa.2018.11.004.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Goth, G. "Identity management, access specs are rolling along". IEEE Internet Computing 9, n.º 1 (enero de 2005): 9–11. http://dx.doi.org/10.1109/mic.2005.16.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Everett, Cath. "Identity and Access Management: the second wave". Computer Fraud & Security 2011, n.º 5 (mayo de 2011): 11–13. http://dx.doi.org/10.1016/s1361-3723(11)70051-3.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Varma, Hardik. "Identity Access Management (IAM), Privilege Access Management (PAM) & Security Operation Center (SOC)". International Journal for Research in Applied Science and Engineering Technology 9, n.º 11 (30 de noviembre de 2021): 1460–66. http://dx.doi.org/10.22214/ijraset.2021.39029.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Crnic, Josipa. "Access and Identity Management for Libraries: Controlling Access to Online Information". Australian Academic & Research Libraries 46, n.º 1 (2 de enero de 2015): 64–65. http://dx.doi.org/10.1080/00048623.2014.993451.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Maclean, Lesa. "Access and identity management for libraries: Controlling access to online information". Australian Library Journal 64, n.º 1 (2 de enero de 2015): 57. http://dx.doi.org/10.1080/00049670.2014.988841.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Lodwick, David. "Access and Identity Management for Libraries: Controlling Access to Online Information". Technical Services Quarterly 32, n.º 1 (17 de diciembre de 2014): 112–13. http://dx.doi.org/10.1080/07317131.2015.972909.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Gunter, Carl, David Liebovitz y Bradley Malin. "Experience-Based Access Management: A Life-Cycle Framework for Identity and Access Management Systems". IEEE Security & Privacy Magazine 9, n.º 5 (septiembre de 2011): 48–55. http://dx.doi.org/10.1109/msp.2011.72.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Ahmed, Md Rayhan, A. K. M. Muzahidul Islam, Swakkhar Shatabda y Salekul Islam. "Blockchain-Based Identity Management System and Self-Sovereign Identity Ecosystem: A Comprehensive Survey". IEEE Access 10 (2022): 113436–81. http://dx.doi.org/10.1109/access.2022.3216643.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Chunduru, Anilkumar y Sumathy S. "Security strategies for cloud identity management - a study". International Journal of Engineering & Technology 7, n.º 2 (12 de mayo de 2018): 732. http://dx.doi.org/10.14419/ijet.v7i2.10410.

Texto completo
Resumen
Emphasis on security for providing Access Control in Cloud computing environment plays a significant role. Cloud computing provides number of benefits such as resource sharing, low speculation and large storage space. Huge amount of information stored in cloud can be accessed from anywhere, anytime on pay-per use basis. Resources in cloud should be accessed only by the authorized clients. Access Control in cloud computing has become a critical issue due to increasing number of users experiencing dynamic changes. Authentication, authorization and approval of the access ensuring liability of entities from login credentials including passwords and biometric scan is essential. Also, the federated authentication management is secured. Current approaches require large-scale distributed access control in cloud environment. Data security and access control are the drawbacks in existing access control schemes. Due to the drawbacks in existing access control schemes such as privacy of information when susceptible information is stored in intermediary service provider a federated identity access management is essential. Access control applications majorly concentrate on Healthcare, Government Organizations, Commercial, Critical Infrastructure and Financial Institutions. This review illustrates a detailed study of access control models in cloud computing and various cloud identity management schemes.
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Al zoubi, Qusay M., Yousef K. Sanjalawe y Mohammed Anbar. "An evaluation of identity and access management systems". International Journal of Internet Technology and Secured Transactions 11, n.º 1 (2021): 35. http://dx.doi.org/10.1504/ijitst.2021.10035182.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Duggal, Ashmeet Kaur y Meenu Dave Dr. "INTELLIGENT IDENTITY AND ACCESS MANAGEMENT USING NEURAL NETWORKS". Indian Journal of Computer Science and Engineering 12, n.º 1 (20 de febrero de 2021): 47–56. http://dx.doi.org/10.21817/indjcse/2021/v12i1/211201154.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Devlekar, Sanket y Vidyavati Ramteke. "Identity and Access Management: High-level Conceptual Framework". Revista Gestão Inovação e Tecnologias 11, n.º 4 (24 de agosto de 2021): 4885–97. http://dx.doi.org/10.47059/revistageintec.v11i4.2511.

Texto completo
Resumen
Information security is shifting from a traditional perimeter-based approach to an identity-based approach where the organization's boundaries are where their digital identities exist. The organization has multiple stakeholders having access to various organization resources. Systems and applications are part of organization resources that help them achieve their business goals. These systems and applications are internally or externally exposed to allow all stakeholders to have seamless access, thus making identity and access management a big challenge. Identity and Access Management (IAM) is a fundamental part of information security. It plays a critical role in keeping the organization's information security posture resilient to cyber attacks. This paper will identify various components of an IAM solution that are essential and should be considered while implementing and assessing the IAM solution and provides a high-level IAM framework that will allow information security professionals to assess the IAM security posture of an organization.
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Sanjalawe, Yousef K., Mohammed Anbar y Qusay M. Al zoubi. "An evaluation of identity and access management systems". International Journal of Internet Technology and Secured Transactions 11, n.º 1 (2021): 35. http://dx.doi.org/10.1504/ijitst.2021.112868.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Adhirai, S., Paramjit Singh y R. P. Mahapatra. "Identity and access management using Boto and JSON". International Journal of Engineering & Technology 7, n.º 2.8 (19 de marzo de 2018): 640. http://dx.doi.org/10.14419/ijet.v7i2.8.10550.

Texto completo
Resumen
Cloud computing has emerged as the important data processing tool as it tackles exponential data growth. This, in turn, makes security something of a moving target. The National Institute of Standards and Technology (NIST), has declared the Identity and Access Management (IAM) as one of the major threats to the cloud computing. The Top Threats Working Group of Cloud Security Alliance (CSA) ranks “IAM” as the second topmost threat among twelve biggest threats in cloud computing. IAM allows the cloud server for managing the web services and herby allowing the users to manage the users and corresponding permissions (user policies). Other benefits posed by the IAM are central management ofusers, and maintain several security qualifications. This paper focuses on Managing IAM Users, and Working with IAM Policies using JavaScript Object Notation (JSON), and Boto. The paper concludes utmost care should be given to IAM user management and IAM user policies. It is the IAM Policies which play the sole role of ensuring security. If you don’t set up IAM policies properly, you will create security holes leading to security lapses.
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Jalili, Vahid, Enis Afgan, James Taylor y Jeremy Goecks. "Cloud bursting galaxy: federated identity and access management". Bioinformatics 36, n.º 1 (14 de junio de 2019): 1–9. http://dx.doi.org/10.1093/bioinformatics/btz472.

Texto completo
Resumen
Abstract Motivation Large biomedical datasets, such as those from genomics and imaging, are increasingly being stored on commercial and institutional cloud computing platforms. This is because cloud-scale computing resources, from robust backup to high-speed data transfer to scalable compute and storage, are needed to make these large datasets usable. However, one challenge for large-scale biomedical data on the cloud is providing secure access, especially when datasets are distributed across platforms. While there are open Web protocols for secure authentication and authorization, these protocols are not in wide use in bioinformatics and are difficult to use for even technologically sophisticated users. Results We have developed a generic and extensible approach for securely accessing biomedical datasets distributed across cloud computing platforms. Our approach combines OpenID Connect and OAuth2, best-practice Web protocols for authentication and authorization, together with Galaxy (https://galaxyproject.org), a web-based computational workbench used by thousands of scientists across the world. With our enhanced version of Galaxy, users can access and analyze data distributed across multiple cloud computing providers without any special knowledge of access/authorization protocols. Our approach does not require users to share permanent credentials (e.g. username, password, API key), instead relying on automatically generated temporary tokens that refresh as needed. Our approach is generalizable to most identity providers and cloud computing platforms. To the best of our knowledge, Galaxy is the only computational workbench where users can access biomedical datasets across multiple cloud computing platforms using best-practice Web security approaches and thereby minimize risks of unauthorized data access and credential use. Availability and implementation Freely available for academic and commercial use under the open-source Academic Free License (https://opensource.org/licenses/AFL-3.0) from the following Github repositories: https://github.com/galaxyproject/galaxy and https://github.com/galaxyproject/cloudauthz.
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

S., Devlekar, y Ramteke, V. "Identity and Access Management: High-level Conceptual Framework". CARDIOMETRY, n.º 24 (30 de noviembre de 2022): 393–99. http://dx.doi.org/10.18137/cardiometry.2022.24.393399.

Texto completo
Resumen
Information security is shifting from a traditional perimeter-based approach to an identity-based approach where the organization’s boundaries are where their digital identities exist. The organization has multiple stakeholders having access to various organization resources. Systems and applications are part of organization resources that help them achieve their business goals. These systems and applications are internally or externally exposed to allow all stakeholders to have seamless access, thus making identity and access management a big challenge. Identity and Access Management (IAM) is a fundamental part of information security. It plays a critical role in keeping the organization’s information security posture resilient to cyber attacks. This paper will identify various components of an IAM solution that are essential and should be considered while implementing and assessing the IAM solution and provides a high-level IAM framework that will allow information security professionals to assess the IAM security posture of an organization.
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Kifayat, Kashif, Sameeh Abdulghafour Jassim y Sufyan T. Faraj. "Management of Identity and Access in the Cloud". Journal of University of Anbar for Pure Science 6, n.º 2 (1 de agosto de 2012): 22–33. http://dx.doi.org/10.37652/juaps.2012.63234.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Godfrey, Duncan. "Layering identity and access management to disrupt attacks". Network Security 2021, n.º 11 (noviembre de 2021): 17–19. http://dx.doi.org/10.1016/s1353-4858(21)00133-1.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Wang, Shangping, Ru Pei y Yaling Zhang. "EIDM: A Ethereum-Based Cloud User Identity Management Protocol". IEEE Access 7 (2019): 115281–91. http://dx.doi.org/10.1109/access.2019.2933989.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Kylänpää, Markku y Jarno Salonen. "Combining System Integrity Verification with Identity and Access Management". European Conference on Cyber Warfare and Security 21, n.º 1 (8 de junio de 2022): 140–49. http://dx.doi.org/10.34190/eccws.21.1.202.

Texto completo
Resumen
Digital transformation and the utilization of Industrial IoT (IIoT) introduces numerous interconnected devices to factories increasing among others the challenge of managing their software versions and giving attackers new possibilities to exploit various software vulnerabilities. Factory networks were earlier isolated from the Internet. However, this separation is no longer valid and there can be connections that allow intruders to penetrate into information systems of factories. Another issue is that although factories typically are physically isolated, it is not necessarily safe to assume that physical security is in good shape as the novel supply networks comprise subcontracted activities and temporary work force. Another threat can also arise from unauthorized monitoring of devices and the unauthorized replacement of existing ones. Based on the previous, it is crucial that IIoT security should be built into factories of the future (FoF) right from the design phase and even low-end devices need to be supported. Trusted computing concept called remote attestation should be used. Remote attestation allows remote parties to verify the integrity of each system component. System components should include trusted hardware components that can be used to measure executable software. The term measurement means calculating the cryptographic hash of the binary component before passing control to it. Trusted hardware components should also have a mechanism to protect the integrity of the measurement list and cryptographic keys that can be used to sign integrity assertions. The verifier part should have a storage of reference integrity metrics identifying the expected values of these measurements. Deploying trusted computing and remote attestation concepts to industrial automation is not straightforward. Even if it is possible to use remote attestation with suitable hardware components, it is not clear how remote attestation should be integrated with various operational technology (OT) industrial automation protocols. Approaches to use remote attestation with existing industrial automation protocols (e.g., OPC UA) is discussed. Advanced identity and access management (e.g., OAuth2, OpenID Connect) can be used to combine integrity measurements with device identity information so that the remote attestation process is triggered by authentication during the first transaction. The focus is on machine-to-machine (M2M) communications with immutable device identities and integrity evidence transfer.
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Divyabharathi D. N. y Nagaraj G. Cholli. "A Review on Identity and Access Management Server (KeyCloak)". International Journal of Security and Privacy in Pervasive Computing 12, n.º 3 (julio de 2020): 46–53. http://dx.doi.org/10.4018/ijsppc.2020070104.

Texto completo
Resumen
KeyCloak is an open source identity and access management arrangement focused on present day applications and administrations. It makes it simple to protect applications and administrations with next to zero code. The identity and access management server component provides centralized user management, authentication, and single sign-on identity brokering user federation, social login, client adapters, an admin console, and an account management console for the applications. With KeyCloak, the user management and authentication functions may be integrated with an externally managed system, such as LDAP or active directory. KeyCloak provides single sign-on infrastructure for authentication and session management. In this paper, the authors present an overview of KeyCloak that gives the objectives and features of KeyCloak and comparisons between the servers. They also present protocols of KeyCloak. Finally, benefits of KeyCloak are defined.
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Flieder, Karl. "Identity- und Access-Management mit EAI-Konzepten und -Technologien". Datenschutz und Datensicherheit - DuD 32, n.º 8 (agosto de 2008): 532–36. http://dx.doi.org/10.1007/s11623-008-0126-4.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Gruschka, N., L. Lo Iacono y H. Rajasekaran. "Identity and access management in multi-institutional medical research". e & i Elektrotechnik und Informationstechnik 127, n.º 5 (mayo de 2010): 143–50. http://dx.doi.org/10.1007/s00502-010-0734-1.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Pöhn, Daniela y Wolfgang Hommel. "New Directions and Challenges within Identity and Access Management". IEEE Communications Standards Magazine 7, n.º 2 (junio de 2023): 84–90. http://dx.doi.org/10.1109/mcomstd.0006.2200077.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Moreno, Rafael Torres, Jesus Garcia-Rodriguez, Jorge Bernal Bernabe y Antonio Skarmeta. "A Trusted Approach for Decentralised and Privacy-Preserving Identity Management". IEEE Access 9 (2021): 105788–804. http://dx.doi.org/10.1109/access.2021.3099837.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Astorga, Jasone, Marc Barcelo, Aitor Urbieta y Eduardo Jacob. "How to Survive Identity Management in the Industry 4.0 Era". IEEE Access 9 (2021): 93137–51. http://dx.doi.org/10.1109/access.2021.3092203.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Fu, Zom Bo, Jian Xin Wang, Lin Yang, Yuan Cao y Wei Xing Zhu. "Open Problems for Privacy Preservation in Identity Management". Applied Mechanics and Materials 40-41 (noviembre de 2010): 652–56. http://dx.doi.org/10.4028/www.scientific.net/amm.40-41.652.

Texto completo
Resumen
In Open Computing Environments, more and more applications are deployed as service. They provide services for users from different organizations. Resources are deployed different organizations or enterprises. Users could access them across organizational boundaries. To ensure the security of resources, users have to provide their identity information to be authorized correctly every time they access a new service. It raises the risk of privacy which identity information was transferred frequently. In this paper, we demonstrate the problem of privacy in Identity Management of open computing environments, discuss the risk of privacy.
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Nuruliansyah, Hendra. "Penerapan Privileged Access Management Menggunakan One Identity Pada Sebuah Perusahaan". INOVA-TIF 2, n.º 1 (2 de enero de 2020): 12. http://dx.doi.org/10.32832/inova-tif.v1i2.2750.

Texto completo
Resumen
<p><em>One Identity Priveged Access Management (PAM) is a solution for a series of efforts to reduce security risks and help companies secure, control, monitor, analyze, and regulate privileged access rights to data and applications from very important organizations. The PAM solution allows companies to provide full credentials such as Administrators on Windows, Root on UNIX, Cisco Enable on Cisco devices, and embedded passwords found in applications and scripts or restricting access to ordinary users. All privileged account activities are recorded by analyzing real time activities and data. Password sharing activities can be eliminated, so security can be improved and compliance with privileges of privileged access rights is more efficient and manageable. Problems that can be explained when the user privileges password access rights do not have regular rules to change the password periodically in accordance with the security policy (password policy) even to obtain information that has accessed the network device using a special account or other permitted account . The purpose of this study is (i) to obtain information about changes in passwords periodically based on the configuration that has been set in the PAM system and adjusted to the password policy rules, (ii) get information about who is accessing the network device and the account accessed. The research method that is carried out is (i) collecting data from the system that will be implemented, (ii) directly accessing the system that has data and viewing information thoroughly into the system, (iii) matching the type of system with the system supported by the PAM application system then integrate it. Testing is done by accessing the target system using privileged access rights through the PAM application system. The results obtained (i) can facilitate password users not to remember passwords too often, (ii) can avoid sharing password information, (iii) change passwords regularly, (iv) find out all user password activities against a set of targets network systems that are permitted to be accessed, (v) record all access activities in the form of videos.</em></p>
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Monson, Jane. "A Review of “Access and Identity Management for Libraries: Controlling Access to Online Information”". Journal of Electronic Resources Librarianship 26, n.º 3 (3 de julio de 2014): 228–29. http://dx.doi.org/10.1080/1941126x.2014.939050.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Schorer, Craig. "A Review of “Access and Identity Management for Libraries: Controlling Access to Online Information”". Journal of Access Services 11, n.º 4 (2 de octubre de 2014): 327–28. http://dx.doi.org/10.1080/15367967.2014.945294.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Dirgantara, Dhimas y Is Mardianto. "TEKNIK IDENTITY AND ACCESS MANAGEMENT PADA LAYANAN AMAZON WEB SERVICES". Computatio : Journal of Computer Science and Information Systems 3, n.º 1 (18 de junio de 2019): 1. http://dx.doi.org/10.24912/computatio.v3i1.4270.

Texto completo
Resumen
In this era, traditional technologies such as having servers and various kinds of hardware have been abandoned by large companies, which are turning to cloud computing technology. This technology makes it easier for companies to run their business. Of the many cloud computing service providers, Amazon Web Service (AWS) is one of the first and biggest service providers. Problems that occur in the use of cloud computing technology is the provision of access rights in data management. AWS has a service to manage access control for each service, namely Identity and Access Management (IAM). This service seeks to prevent activities that lead to security breaches. The results obtained are in the form of groups that can access AWS services according to the role given. Pada era ini, teknologi tradisional seperti memiliki server dan berbagai macam hardware telah ditinggalkan oleh perusahaan besar, yang beralih pada teknologi cloud computing. Teknologi ini memudahkan perusahaan dalam menjalankan bisnisnya. Dari banyaknya penyedia layanan cloud computing, Amazon Web Service (AWS) adalah salah satu penyedia layanan pertama dan yang terbesar. Masalah-masalah yang terjadi dalam penggunaan teknologi cloud computing adalah pemberian hak akses dalam melakukan manajemen data. AWS memiliki suatu layanan untuk mengatur kendali akses pada setiap layanan yaitu Identity and Access Management (IAM). Layanan ini berupaya mencegah aktivitas yang mengarah pada pelanggaran keamanan. Hasil yang didapatkan berupa group yang dapat mengakses layanan AWS sesuai dengan role yang diberikan.
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Karim Abdul-Hassan, Alia y Iman Hasson Hadi. "INTELLIGENT AUTHENTICATION FOR IDENTITY AND ACCESS MANAGEMENT: A REVIEW PAPER". Iraqi Journal for Computers and informatics 45, n.º 1 (8 de diciembre de 2019): 6–10. http://dx.doi.org/10.25195/2017/4512.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Hadi, Iman. "INTELLIGENT AUTHENTICATION FOR IDENTITY AND ACCESS MANAGEMENT: A REVIEW PAPER". Iraqi Journal for Computers and Informatics 45, n.º 1 (1 de mayo de 2019): 6–10. http://dx.doi.org/10.25195/ijci.v45i1.39.

Texto completo
Resumen
Identity and access management (IAM) system usually consist of predefined tasks as an information security system. Themain task is the authentication, since it is responsible for user identity proving for service providers that corporate with (IAM).This paper provides a review on intelligent authentication research applicable to IAM systems. These researches areevaluated according to the proposal of intelligent authentication key factors. Depending on this evaluation it could not be foundresearch implement an authentication that satisfies all these key factors.
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Aguado Corman, Asier, Daniel Fernández Rodríguez, Maria V. Georgiou, Julien Rische, Ioan Cristian Schuszter, Hannah Short y Paolo Tedesco. "CERN’s Identity and Access Management: A journey to Open Source". EPJ Web of Conferences 245 (2020): 03012. http://dx.doi.org/10.1051/epjconf/202024503012.

Texto completo
Resumen
Until recently, CERN had been considered eligible for academic pricing of Microsoft products. Now, along with many other research institutes, CERN has been disqualified from this educational programme and faces a 20 fold increase in license costs. CERN’s current Authentication and Authorization Infrastructure, dating from 2008, comprises multiple Microsoft services from the web Single-Sign-On to the Accounts Database. Replacing these core components is an opportunity to rebuild the CERN infrastructure using the latest technologies and concepts and to respond to evolving requirements of the community. It is also the appropriate moment to consider the alignment of CERN’s and the Worldwide LHC Computing Grid’s approaches to identity management, to create a more consistent environment for operators, developers and users. 2019 saw the launch of an Alpha version of CERN’s next generation Authentication and Authorization Infrastructure, focusing on free and open source products and responding to the limitations experienced by the current system. We describe the new solution and focus on key changes.
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Schanzenbach, Martin y Sebastian Zickau. "Identity and access management in a doping control use case". Datenschutz und Datensicherheit - DuD 41, n.º 12 (diciembre de 2017): 724–28. http://dx.doi.org/10.1007/s11623-017-0867-z.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Rasouli, Hatef y Changiz Valmohammadi. "Proposing a conceptual framework for customer identity and access management". Global Knowledge, Memory and Communication 69, n.º 1/2 (29 de julio de 2019): 94–116. http://dx.doi.org/10.1108/gkmc-02-2019-0014.

Texto completo
Resumen
Purpose Customer identity and access management (CIAM) is a sub-genre of traditional identity and access management (IAM) that has emerged in the past few years to meet evolving business requirements. CIAM focuses on the connectivity with the customer when accessing any type of systems, on-premises and in the cloud, from registration to track. The purpose of this study is to introduce different dimensions of CIAM toward exploiting them in organizations. Design/methodology/approach Based on a thorough review of the relevant literature and semi-structured interview with six experts in the field of digital IAM the necessary data were gathered. Then through the use of content analysis technique, analytic codes and also categories and sub-categories of the data were generated. Findings Results indicate that four categories, namely, customer identity management, customer access management and information technology and business management are the most important factors affecting the identification of CIAM dimensions. Originality/value Organizations could avail of the proposed conceptual model toward identification and offering customized products and services solutions to their customers.
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Indu, I., P. M. Rubesh Anand y Vidhyacharan Bhaskar. "Identity and access management in cloud environment: Mechanisms and challenges". Engineering Science and Technology, an International Journal 21, n.º 4 (agosto de 2018): 574–88. http://dx.doi.org/10.1016/j.jestch.2018.05.010.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Nikhil Ghadge. "Enhancing threat detection in Identity and Access Management (IAM) systems". International Journal of Science and Research Archive 11, n.º 2 (30 de abril de 2024): 2050–57. http://dx.doi.org/10.30574/ijsra.2024.11.2.0761.

Texto completo
Resumen
Identity and Access Management (IAM) systems play a pivotal role in safeguarding organizational resources by controlling access to sensitive information. However, these systems face evolving threats that can compromise security and privacy. This paper proposes a comprehensive approach to enhance threat detection within IAM systems. By integrating advanced techniques such as anomaly detection, machine learning, and behavior analysis, organizations can better identify and respond to suspicious activities. This paper discusses the challenges associated with threat detection in IAM systems and presents practical solutions to mitigate these risks. Furthermore, the paper highlights the importance of continuous monitoring and adaptation effectively combat emerging threats.
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Singla, Ashish, Nakul Gupta, Prageet Aeron, Anshul Jain, Divya Sharma y Sangeeta Shah Bharadwaj. "Decentralized Identity Management Using Blockchain". Journal of Global Information Management 31, n.º 2 (29 de diciembre de 2022): 1–24. http://dx.doi.org/10.4018/jgim.315283.

Texto completo
Resumen
This article explores the usage of decentralised identity (DID) management using blockchain in global organisations to support secure usage of information resources. Blockchain as technology was initially introduced as a cryptocurrency and there have been challenges in its adoption for enterprise applications such as identity management. DID is emerging as one of the strong blockchain adoption use cases. Industry pioneers and users across domains have started exploring DID use cases, which help better protect their personal data and application access control as compared to traditional, central, or federated identity management models. In this exploratory work, the authors employ qualitative secondary case-based study research methodology to understand the challenges of the current digital identity management landscape and explore the possible benefits of DID as an emerging identity management paradigm. They propose a conceptual cube framework for analysing and studying various DID platforms thereby contributing to both the theory and practice of digitally secure identity.
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía