Artykuły w czasopismach na temat „Identity access management”

Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Identity access management.

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Identity access management”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Pol, Mr Vinay Jayprakash. "Identity and Access Management Tools". International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (30.06.2019): 796–98. http://dx.doi.org/10.31142/ijtsrd23935.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Uddin, Mumina, i David Preston. "Systematic Review of Identity Access Management in Information Security". Journal of Advances in Computer Networks 3, nr 2 (2015): 150–56. http://dx.doi.org/10.7763/jacn.2015.v3.158.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Carnley, P. Renee, i Houssain Kettani. "Identity and Access Management for the Internet of Things". International Journal of Future Computer and Communication 8, nr 4 (grudzień 2019): 129–33. http://dx.doi.org/10.18178/ijfcc.2019.8.4.554.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Kumar, Vikas, i Aashish Bhardwaj. "Identity Management Systems". International Journal of Strategic Decision Sciences 9, nr 1 (styczeń 2018): 63–78. http://dx.doi.org/10.4018/ijsds.2018010105.

Pełny tekst źródła
Streszczenie:
This article describes how in today's digital world, customers have made it a common practice to maintain user accounts with different service providers to access a range of services. In such environment, all attributes of the identity must be verified to operate, otherwise the resources would be vulnerable to financial and data loss. This article contends that makes it important to form an Identity Management System, which could provide central administration, user self- service, role based access control and integrated user management. Identity Management becomes very much vital for the environment working with multiple technologies, as it governs an entity (i.e. a human or a software agent) to authenticate and authorize for accessing the network via multiple technologies. Successful Identity Management increases the efficiency, security, access control and decreases the complexity, cost and many repetitive works. Essential features of present day identity management systems have been identified in the present work. A comparative analysis of these identity management systems has been carried out to establish the present-day industry practices. Along with that, specific challenges to the present-day identity management systems have been identified. The article helps in the identification of suitable Identity Management System for specific applications.
Style APA, Harvard, Vancouver, ISO itp.
5

Jin, Qiang, i Deren Kudeki. "Identity and Access Management for Libraries". Technical Services Quarterly 36, nr 1 (2.01.2019): 44–60. http://dx.doi.org/10.1080/07317131.2018.1532056.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Fuchs, Ludwig, i Günther Pernul. "Qualitätssicherung im Identity- und Access Management". HMD Praxis der Wirtschaftsinformatik 50, nr 1 (luty 2013): 88–97. http://dx.doi.org/10.1007/bf03340780.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Pawar, Pratik. "KeyHound - Identity Provider and Access Management". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, nr 04 (9.04.2024): 1–5. http://dx.doi.org/10.55041/ijsrem30444.

Pełny tekst źródła
Streszczenie:
Single organization handles multiple applications based on different departments or needs. To access these applications, users must remember the login credentials for each. This results in the data of mutual users being stored in different identity providers, causing data redundancy and indirectly increasing storage costs. Solution is needed to globalize user credentials. Implementing a centralized system aids organizations in saving storage costs by eliminating redundant user data stored across multiple identity providers. Key Words: Identity provider and Management, Access management, Validation, Authorization.
Style APA, Harvard, Vancouver, ISO itp.
8

Martin, Luther. "Identity-based Encryption: From Identity and Access Management to Enterprise Privacy Management". Information Systems Security 16, nr 1 (28.03.2007): 9–14. http://dx.doi.org/10.1080/10658980601051268.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Saloni Kumari. "Identity and access management: "Elevating security and efficiency: Unveiling the crucial aspects of identity and access management”". International Journal of Engineering & Technology 12, nr 1 (6.09.2023): 11–14. http://dx.doi.org/10.14419/ijet.v12i1.32333.

Pełny tekst źródła
Streszczenie:
The foundation of the software is the identity and access management system. A fundamental and essential cybersecurity competency is ensuring that the right parties have timely access to the right resources. The IAM has four domains: IAAA stands for identification, authentication, authorization, and accounting, the second is Privileged Access Management (PAM), third-party Identity Governance and Administration, data governance and protection. In this article, the concepts of identification, authentication, authorization, and accounting are discussed, as well as how IAAA works in an online setting.
Style APA, Harvard, Vancouver, ISO itp.
10

Dhamdhere, Mayuri, Shridevi Karande i Madhura Phatak. "Peer Group Analysis in Identity and Access Management to Identify Anomalies". International Journal of Engineering and Technology 9, nr 3S (17.07.2017): 116–21. http://dx.doi.org/10.21817/ijet/2017/v9i3/170903s020.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
11

Kunz, Michael, Alexander Puchta, Sebastian Groll, Ludwig Fuchs i Günther Pernul. "Attribute quality management for dynamic identity and access management". Journal of Information Security and Applications 44 (luty 2019): 64–79. http://dx.doi.org/10.1016/j.jisa.2018.11.004.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
12

Goth, G. "Identity management, access specs are rolling along". IEEE Internet Computing 9, nr 1 (styczeń 2005): 9–11. http://dx.doi.org/10.1109/mic.2005.16.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
13

Everett, Cath. "Identity and Access Management: the second wave". Computer Fraud & Security 2011, nr 5 (maj 2011): 11–13. http://dx.doi.org/10.1016/s1361-3723(11)70051-3.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
14

Varma, Hardik. "Identity Access Management (IAM), Privilege Access Management (PAM) & Security Operation Center (SOC)". International Journal for Research in Applied Science and Engineering Technology 9, nr 11 (30.11.2021): 1460–66. http://dx.doi.org/10.22214/ijraset.2021.39029.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
15

Crnic, Josipa. "Access and Identity Management for Libraries: Controlling Access to Online Information". Australian Academic & Research Libraries 46, nr 1 (2.01.2015): 64–65. http://dx.doi.org/10.1080/00048623.2014.993451.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
16

Maclean, Lesa. "Access and identity management for libraries: Controlling access to online information". Australian Library Journal 64, nr 1 (2.01.2015): 57. http://dx.doi.org/10.1080/00049670.2014.988841.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
17

Lodwick, David. "Access and Identity Management for Libraries: Controlling Access to Online Information". Technical Services Quarterly 32, nr 1 (17.12.2014): 112–13. http://dx.doi.org/10.1080/07317131.2015.972909.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
18

Gunter, Carl, David Liebovitz i Bradley Malin. "Experience-Based Access Management: A Life-Cycle Framework for Identity and Access Management Systems". IEEE Security & Privacy Magazine 9, nr 5 (wrzesień 2011): 48–55. http://dx.doi.org/10.1109/msp.2011.72.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
19

Ahmed, Md Rayhan, A. K. M. Muzahidul Islam, Swakkhar Shatabda i Salekul Islam. "Blockchain-Based Identity Management System and Self-Sovereign Identity Ecosystem: A Comprehensive Survey". IEEE Access 10 (2022): 113436–81. http://dx.doi.org/10.1109/access.2022.3216643.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
20

Chunduru, Anilkumar, i Sumathy S. "Security strategies for cloud identity management - a study". International Journal of Engineering & Technology 7, nr 2 (12.05.2018): 732. http://dx.doi.org/10.14419/ijet.v7i2.10410.

Pełny tekst źródła
Streszczenie:
Emphasis on security for providing Access Control in Cloud computing environment plays a significant role. Cloud computing provides number of benefits such as resource sharing, low speculation and large storage space. Huge amount of information stored in cloud can be accessed from anywhere, anytime on pay-per use basis. Resources in cloud should be accessed only by the authorized clients. Access Control in cloud computing has become a critical issue due to increasing number of users experiencing dynamic changes. Authentication, authorization and approval of the access ensuring liability of entities from login credentials including passwords and biometric scan is essential. Also, the federated authentication management is secured. Current approaches require large-scale distributed access control in cloud environment. Data security and access control are the drawbacks in existing access control schemes. Due to the drawbacks in existing access control schemes such as privacy of information when susceptible information is stored in intermediary service provider a federated identity access management is essential. Access control applications majorly concentrate on Healthcare, Government Organizations, Commercial, Critical Infrastructure and Financial Institutions. This review illustrates a detailed study of access control models in cloud computing and various cloud identity management schemes.
Style APA, Harvard, Vancouver, ISO itp.
21

Al zoubi, Qusay M., Yousef K. Sanjalawe i Mohammed Anbar. "An evaluation of identity and access management systems". International Journal of Internet Technology and Secured Transactions 11, nr 1 (2021): 35. http://dx.doi.org/10.1504/ijitst.2021.10035182.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
22

Duggal, Ashmeet Kaur, i Meenu Dave Dr. "INTELLIGENT IDENTITY AND ACCESS MANAGEMENT USING NEURAL NETWORKS". Indian Journal of Computer Science and Engineering 12, nr 1 (20.02.2021): 47–56. http://dx.doi.org/10.21817/indjcse/2021/v12i1/211201154.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
23

Devlekar, Sanket, i Vidyavati Ramteke. "Identity and Access Management: High-level Conceptual Framework". Revista Gestão Inovação e Tecnologias 11, nr 4 (24.08.2021): 4885–97. http://dx.doi.org/10.47059/revistageintec.v11i4.2511.

Pełny tekst źródła
Streszczenie:
Information security is shifting from a traditional perimeter-based approach to an identity-based approach where the organization's boundaries are where their digital identities exist. The organization has multiple stakeholders having access to various organization resources. Systems and applications are part of organization resources that help them achieve their business goals. These systems and applications are internally or externally exposed to allow all stakeholders to have seamless access, thus making identity and access management a big challenge. Identity and Access Management (IAM) is a fundamental part of information security. It plays a critical role in keeping the organization's information security posture resilient to cyber attacks. This paper will identify various components of an IAM solution that are essential and should be considered while implementing and assessing the IAM solution and provides a high-level IAM framework that will allow information security professionals to assess the IAM security posture of an organization.
Style APA, Harvard, Vancouver, ISO itp.
24

Sanjalawe, Yousef K., Mohammed Anbar i Qusay M. Al zoubi. "An evaluation of identity and access management systems". International Journal of Internet Technology and Secured Transactions 11, nr 1 (2021): 35. http://dx.doi.org/10.1504/ijitst.2021.112868.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
25

Adhirai, S., Paramjit Singh i R. P. Mahapatra. "Identity and access management using Boto and JSON". International Journal of Engineering & Technology 7, nr 2.8 (19.03.2018): 640. http://dx.doi.org/10.14419/ijet.v7i2.8.10550.

Pełny tekst źródła
Streszczenie:
Cloud computing has emerged as the important data processing tool as it tackles exponential data growth. This, in turn, makes security something of a moving target. The National Institute of Standards and Technology (NIST), has declared the Identity and Access Management (IAM) as one of the major threats to the cloud computing. The Top Threats Working Group of Cloud Security Alliance (CSA) ranks “IAM” as the second topmost threat among twelve biggest threats in cloud computing. IAM allows the cloud server for managing the web services and herby allowing the users to manage the users and corresponding permissions (user policies). Other benefits posed by the IAM are central management ofusers, and maintain several security qualifications. This paper focuses on Managing IAM Users, and Working with IAM Policies using JavaScript Object Notation (JSON), and Boto. The paper concludes utmost care should be given to IAM user management and IAM user policies. It is the IAM Policies which play the sole role of ensuring security. If you don’t set up IAM policies properly, you will create security holes leading to security lapses.
Style APA, Harvard, Vancouver, ISO itp.
26

Jalili, Vahid, Enis Afgan, James Taylor i Jeremy Goecks. "Cloud bursting galaxy: federated identity and access management". Bioinformatics 36, nr 1 (14.06.2019): 1–9. http://dx.doi.org/10.1093/bioinformatics/btz472.

Pełny tekst źródła
Streszczenie:
Abstract Motivation Large biomedical datasets, such as those from genomics and imaging, are increasingly being stored on commercial and institutional cloud computing platforms. This is because cloud-scale computing resources, from robust backup to high-speed data transfer to scalable compute and storage, are needed to make these large datasets usable. However, one challenge for large-scale biomedical data on the cloud is providing secure access, especially when datasets are distributed across platforms. While there are open Web protocols for secure authentication and authorization, these protocols are not in wide use in bioinformatics and are difficult to use for even technologically sophisticated users. Results We have developed a generic and extensible approach for securely accessing biomedical datasets distributed across cloud computing platforms. Our approach combines OpenID Connect and OAuth2, best-practice Web protocols for authentication and authorization, together with Galaxy (https://galaxyproject.org), a web-based computational workbench used by thousands of scientists across the world. With our enhanced version of Galaxy, users can access and analyze data distributed across multiple cloud computing providers without any special knowledge of access/authorization protocols. Our approach does not require users to share permanent credentials (e.g. username, password, API key), instead relying on automatically generated temporary tokens that refresh as needed. Our approach is generalizable to most identity providers and cloud computing platforms. To the best of our knowledge, Galaxy is the only computational workbench where users can access biomedical datasets across multiple cloud computing platforms using best-practice Web security approaches and thereby minimize risks of unauthorized data access and credential use. Availability and implementation Freely available for academic and commercial use under the open-source Academic Free License (https://opensource.org/licenses/AFL-3.0) from the following Github repositories: https://github.com/galaxyproject/galaxy and https://github.com/galaxyproject/cloudauthz.
Style APA, Harvard, Vancouver, ISO itp.
27

S., Devlekar,, i Ramteke, V. "Identity and Access Management: High-level Conceptual Framework". CARDIOMETRY, nr 24 (30.11.2022): 393–99. http://dx.doi.org/10.18137/cardiometry.2022.24.393399.

Pełny tekst źródła
Streszczenie:
Information security is shifting from a traditional perimeter-based approach to an identity-based approach where the organization’s boundaries are where their digital identities exist. The organization has multiple stakeholders having access to various organization resources. Systems and applications are part of organization resources that help them achieve their business goals. These systems and applications are internally or externally exposed to allow all stakeholders to have seamless access, thus making identity and access management a big challenge. Identity and Access Management (IAM) is a fundamental part of information security. It plays a critical role in keeping the organization’s information security posture resilient to cyber attacks. This paper will identify various components of an IAM solution that are essential and should be considered while implementing and assessing the IAM solution and provides a high-level IAM framework that will allow information security professionals to assess the IAM security posture of an organization.
Style APA, Harvard, Vancouver, ISO itp.
28

Kifayat, Kashif, Sameeh Abdulghafour Jassim i Sufyan T. Faraj. "Management of Identity and Access in the Cloud". Journal of University of Anbar for Pure Science 6, nr 2 (1.08.2012): 22–33. http://dx.doi.org/10.37652/juaps.2012.63234.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
29

Godfrey, Duncan. "Layering identity and access management to disrupt attacks". Network Security 2021, nr 11 (listopad 2021): 17–19. http://dx.doi.org/10.1016/s1353-4858(21)00133-1.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
30

Wang, Shangping, Ru Pei i Yaling Zhang. "EIDM: A Ethereum-Based Cloud User Identity Management Protocol". IEEE Access 7 (2019): 115281–91. http://dx.doi.org/10.1109/access.2019.2933989.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
31

Kylänpää, Markku, i Jarno Salonen. "Combining System Integrity Verification with Identity and Access Management". European Conference on Cyber Warfare and Security 21, nr 1 (8.06.2022): 140–49. http://dx.doi.org/10.34190/eccws.21.1.202.

Pełny tekst źródła
Streszczenie:
Digital transformation and the utilization of Industrial IoT (IIoT) introduces numerous interconnected devices to factories increasing among others the challenge of managing their software versions and giving attackers new possibilities to exploit various software vulnerabilities. Factory networks were earlier isolated from the Internet. However, this separation is no longer valid and there can be connections that allow intruders to penetrate into information systems of factories. Another issue is that although factories typically are physically isolated, it is not necessarily safe to assume that physical security is in good shape as the novel supply networks comprise subcontracted activities and temporary work force. Another threat can also arise from unauthorized monitoring of devices and the unauthorized replacement of existing ones. Based on the previous, it is crucial that IIoT security should be built into factories of the future (FoF) right from the design phase and even low-end devices need to be supported. Trusted computing concept called remote attestation should be used. Remote attestation allows remote parties to verify the integrity of each system component. System components should include trusted hardware components that can be used to measure executable software. The term measurement means calculating the cryptographic hash of the binary component before passing control to it. Trusted hardware components should also have a mechanism to protect the integrity of the measurement list and cryptographic keys that can be used to sign integrity assertions. The verifier part should have a storage of reference integrity metrics identifying the expected values of these measurements. Deploying trusted computing and remote attestation concepts to industrial automation is not straightforward. Even if it is possible to use remote attestation with suitable hardware components, it is not clear how remote attestation should be integrated with various operational technology (OT) industrial automation protocols. Approaches to use remote attestation with existing industrial automation protocols (e.g., OPC UA) is discussed. Advanced identity and access management (e.g., OAuth2, OpenID Connect) can be used to combine integrity measurements with device identity information so that the remote attestation process is triggered by authentication during the first transaction. The focus is on machine-to-machine (M2M) communications with immutable device identities and integrity evidence transfer.
Style APA, Harvard, Vancouver, ISO itp.
32

Divyabharathi D. N. i Nagaraj G. Cholli. "A Review on Identity and Access Management Server (KeyCloak)". International Journal of Security and Privacy in Pervasive Computing 12, nr 3 (lipiec 2020): 46–53. http://dx.doi.org/10.4018/ijsppc.2020070104.

Pełny tekst źródła
Streszczenie:
KeyCloak is an open source identity and access management arrangement focused on present day applications and administrations. It makes it simple to protect applications and administrations with next to zero code. The identity and access management server component provides centralized user management, authentication, and single sign-on identity brokering user federation, social login, client adapters, an admin console, and an account management console for the applications. With KeyCloak, the user management and authentication functions may be integrated with an externally managed system, such as LDAP or active directory. KeyCloak provides single sign-on infrastructure for authentication and session management. In this paper, the authors present an overview of KeyCloak that gives the objectives and features of KeyCloak and comparisons between the servers. They also present protocols of KeyCloak. Finally, benefits of KeyCloak are defined.
Style APA, Harvard, Vancouver, ISO itp.
33

Flieder, Karl. "Identity- und Access-Management mit EAI-Konzepten und -Technologien". Datenschutz und Datensicherheit - DuD 32, nr 8 (sierpień 2008): 532–36. http://dx.doi.org/10.1007/s11623-008-0126-4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
34

Gruschka, N., L. Lo Iacono i H. Rajasekaran. "Identity and access management in multi-institutional medical research". e & i Elektrotechnik und Informationstechnik 127, nr 5 (maj 2010): 143–50. http://dx.doi.org/10.1007/s00502-010-0734-1.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
35

Pöhn, Daniela, i Wolfgang Hommel. "New Directions and Challenges within Identity and Access Management". IEEE Communications Standards Magazine 7, nr 2 (czerwiec 2023): 84–90. http://dx.doi.org/10.1109/mcomstd.0006.2200077.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
36

Moreno, Rafael Torres, Jesus Garcia-Rodriguez, Jorge Bernal Bernabe i Antonio Skarmeta. "A Trusted Approach for Decentralised and Privacy-Preserving Identity Management". IEEE Access 9 (2021): 105788–804. http://dx.doi.org/10.1109/access.2021.3099837.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
37

Astorga, Jasone, Marc Barcelo, Aitor Urbieta i Eduardo Jacob. "How to Survive Identity Management in the Industry 4.0 Era". IEEE Access 9 (2021): 93137–51. http://dx.doi.org/10.1109/access.2021.3092203.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
38

Fu, Zom Bo, Jian Xin Wang, Lin Yang, Yuan Cao i Wei Xing Zhu. "Open Problems for Privacy Preservation in Identity Management". Applied Mechanics and Materials 40-41 (listopad 2010): 652–56. http://dx.doi.org/10.4028/www.scientific.net/amm.40-41.652.

Pełny tekst źródła
Streszczenie:
In Open Computing Environments, more and more applications are deployed as service. They provide services for users from different organizations. Resources are deployed different organizations or enterprises. Users could access them across organizational boundaries. To ensure the security of resources, users have to provide their identity information to be authorized correctly every time they access a new service. It raises the risk of privacy which identity information was transferred frequently. In this paper, we demonstrate the problem of privacy in Identity Management of open computing environments, discuss the risk of privacy.
Style APA, Harvard, Vancouver, ISO itp.
39

Nuruliansyah, Hendra. "Penerapan Privileged Access Management Menggunakan One Identity Pada Sebuah Perusahaan". INOVA-TIF 2, nr 1 (2.01.2020): 12. http://dx.doi.org/10.32832/inova-tif.v1i2.2750.

Pełny tekst źródła
Streszczenie:
<p><em>One Identity Priveged Access Management (PAM) is a solution for a series of efforts to reduce security risks and help companies secure, control, monitor, analyze, and regulate privileged access rights to data and applications from very important organizations. The PAM solution allows companies to provide full credentials such as Administrators on Windows, Root on UNIX, Cisco Enable on Cisco devices, and embedded passwords found in applications and scripts or restricting access to ordinary users. All privileged account activities are recorded by analyzing real time activities and data. Password sharing activities can be eliminated, so security can be improved and compliance with privileges of privileged access rights is more efficient and manageable. Problems that can be explained when the user privileges password access rights do not have regular rules to change the password periodically in accordance with the security policy (password policy) even to obtain information that has accessed the network device using a special account or other permitted account . The purpose of this study is (i) to obtain information about changes in passwords periodically based on the configuration that has been set in the PAM system and adjusted to the password policy rules, (ii) get information about who is accessing the network device and the account accessed. The research method that is carried out is (i) collecting data from the system that will be implemented, (ii) directly accessing the system that has data and viewing information thoroughly into the system, (iii) matching the type of system with the system supported by the PAM application system then integrate it. Testing is done by accessing the target system using privileged access rights through the PAM application system. The results obtained (i) can facilitate password users not to remember passwords too often, (ii) can avoid sharing password information, (iii) change passwords regularly, (iv) find out all user password activities against a set of targets network systems that are permitted to be accessed, (v) record all access activities in the form of videos.</em></p>
Style APA, Harvard, Vancouver, ISO itp.
40

Monson, Jane. "A Review of “Access and Identity Management for Libraries: Controlling Access to Online Information”". Journal of Electronic Resources Librarianship 26, nr 3 (3.07.2014): 228–29. http://dx.doi.org/10.1080/1941126x.2014.939050.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
41

Schorer, Craig. "A Review of “Access and Identity Management for Libraries: Controlling Access to Online Information”". Journal of Access Services 11, nr 4 (2.10.2014): 327–28. http://dx.doi.org/10.1080/15367967.2014.945294.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
42

Dirgantara, Dhimas, i Is Mardianto. "TEKNIK IDENTITY AND ACCESS MANAGEMENT PADA LAYANAN AMAZON WEB SERVICES". Computatio : Journal of Computer Science and Information Systems 3, nr 1 (18.06.2019): 1. http://dx.doi.org/10.24912/computatio.v3i1.4270.

Pełny tekst źródła
Streszczenie:
In this era, traditional technologies such as having servers and various kinds of hardware have been abandoned by large companies, which are turning to cloud computing technology. This technology makes it easier for companies to run their business. Of the many cloud computing service providers, Amazon Web Service (AWS) is one of the first and biggest service providers. Problems that occur in the use of cloud computing technology is the provision of access rights in data management. AWS has a service to manage access control for each service, namely Identity and Access Management (IAM). This service seeks to prevent activities that lead to security breaches. The results obtained are in the form of groups that can access AWS services according to the role given. Pada era ini, teknologi tradisional seperti memiliki server dan berbagai macam hardware telah ditinggalkan oleh perusahaan besar, yang beralih pada teknologi cloud computing. Teknologi ini memudahkan perusahaan dalam menjalankan bisnisnya. Dari banyaknya penyedia layanan cloud computing, Amazon Web Service (AWS) adalah salah satu penyedia layanan pertama dan yang terbesar. Masalah-masalah yang terjadi dalam penggunaan teknologi cloud computing adalah pemberian hak akses dalam melakukan manajemen data. AWS memiliki suatu layanan untuk mengatur kendali akses pada setiap layanan yaitu Identity and Access Management (IAM). Layanan ini berupaya mencegah aktivitas yang mengarah pada pelanggaran keamanan. Hasil yang didapatkan berupa group yang dapat mengakses layanan AWS sesuai dengan role yang diberikan.
Style APA, Harvard, Vancouver, ISO itp.
43

Karim Abdul-Hassan, Alia, i Iman Hasson Hadi. "INTELLIGENT AUTHENTICATION FOR IDENTITY AND ACCESS MANAGEMENT: A REVIEW PAPER". Iraqi Journal for Computers and informatics 45, nr 1 (8.12.2019): 6–10. http://dx.doi.org/10.25195/2017/4512.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
44

Hadi, Iman. "INTELLIGENT AUTHENTICATION FOR IDENTITY AND ACCESS MANAGEMENT: A REVIEW PAPER". Iraqi Journal for Computers and Informatics 45, nr 1 (1.05.2019): 6–10. http://dx.doi.org/10.25195/ijci.v45i1.39.

Pełny tekst źródła
Streszczenie:
Identity and access management (IAM) system usually consist of predefined tasks as an information security system. Themain task is the authentication, since it is responsible for user identity proving for service providers that corporate with (IAM).This paper provides a review on intelligent authentication research applicable to IAM systems. These researches areevaluated according to the proposal of intelligent authentication key factors. Depending on this evaluation it could not be foundresearch implement an authentication that satisfies all these key factors.
Style APA, Harvard, Vancouver, ISO itp.
45

Aguado Corman, Asier, Daniel Fernández Rodríguez, Maria V. Georgiou, Julien Rische, Ioan Cristian Schuszter, Hannah Short i Paolo Tedesco. "CERN’s Identity and Access Management: A journey to Open Source". EPJ Web of Conferences 245 (2020): 03012. http://dx.doi.org/10.1051/epjconf/202024503012.

Pełny tekst źródła
Streszczenie:
Until recently, CERN had been considered eligible for academic pricing of Microsoft products. Now, along with many other research institutes, CERN has been disqualified from this educational programme and faces a 20 fold increase in license costs. CERN’s current Authentication and Authorization Infrastructure, dating from 2008, comprises multiple Microsoft services from the web Single-Sign-On to the Accounts Database. Replacing these core components is an opportunity to rebuild the CERN infrastructure using the latest technologies and concepts and to respond to evolving requirements of the community. It is also the appropriate moment to consider the alignment of CERN’s and the Worldwide LHC Computing Grid’s approaches to identity management, to create a more consistent environment for operators, developers and users. 2019 saw the launch of an Alpha version of CERN’s next generation Authentication and Authorization Infrastructure, focusing on free and open source products and responding to the limitations experienced by the current system. We describe the new solution and focus on key changes.
Style APA, Harvard, Vancouver, ISO itp.
46

Schanzenbach, Martin, i Sebastian Zickau. "Identity and access management in a doping control use case". Datenschutz und Datensicherheit - DuD 41, nr 12 (grudzień 2017): 724–28. http://dx.doi.org/10.1007/s11623-017-0867-z.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
47

Rasouli, Hatef, i Changiz Valmohammadi. "Proposing a conceptual framework for customer identity and access management". Global Knowledge, Memory and Communication 69, nr 1/2 (29.07.2019): 94–116. http://dx.doi.org/10.1108/gkmc-02-2019-0014.

Pełny tekst źródła
Streszczenie:
Purpose Customer identity and access management (CIAM) is a sub-genre of traditional identity and access management (IAM) that has emerged in the past few years to meet evolving business requirements. CIAM focuses on the connectivity with the customer when accessing any type of systems, on-premises and in the cloud, from registration to track. The purpose of this study is to introduce different dimensions of CIAM toward exploiting them in organizations. Design/methodology/approach Based on a thorough review of the relevant literature and semi-structured interview with six experts in the field of digital IAM the necessary data were gathered. Then through the use of content analysis technique, analytic codes and also categories and sub-categories of the data were generated. Findings Results indicate that four categories, namely, customer identity management, customer access management and information technology and business management are the most important factors affecting the identification of CIAM dimensions. Originality/value Organizations could avail of the proposed conceptual model toward identification and offering customized products and services solutions to their customers.
Style APA, Harvard, Vancouver, ISO itp.
48

Indu, I., P. M. Rubesh Anand i Vidhyacharan Bhaskar. "Identity and access management in cloud environment: Mechanisms and challenges". Engineering Science and Technology, an International Journal 21, nr 4 (sierpień 2018): 574–88. http://dx.doi.org/10.1016/j.jestch.2018.05.010.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
49

Nikhil Ghadge. "Enhancing threat detection in Identity and Access Management (IAM) systems". International Journal of Science and Research Archive 11, nr 2 (30.04.2024): 2050–57. http://dx.doi.org/10.30574/ijsra.2024.11.2.0761.

Pełny tekst źródła
Streszczenie:
Identity and Access Management (IAM) systems play a pivotal role in safeguarding organizational resources by controlling access to sensitive information. However, these systems face evolving threats that can compromise security and privacy. This paper proposes a comprehensive approach to enhance threat detection within IAM systems. By integrating advanced techniques such as anomaly detection, machine learning, and behavior analysis, organizations can better identify and respond to suspicious activities. This paper discusses the challenges associated with threat detection in IAM systems and presents practical solutions to mitigate these risks. Furthermore, the paper highlights the importance of continuous monitoring and adaptation effectively combat emerging threats.
Style APA, Harvard, Vancouver, ISO itp.
50

Singla, Ashish, Nakul Gupta, Prageet Aeron, Anshul Jain, Divya Sharma i Sangeeta Shah Bharadwaj. "Decentralized Identity Management Using Blockchain". Journal of Global Information Management 31, nr 2 (29.12.2022): 1–24. http://dx.doi.org/10.4018/jgim.315283.

Pełny tekst źródła
Streszczenie:
This article explores the usage of decentralised identity (DID) management using blockchain in global organisations to support secure usage of information resources. Blockchain as technology was initially introduced as a cryptocurrency and there have been challenges in its adoption for enterprise applications such as identity management. DID is emerging as one of the strong blockchain adoption use cases. Industry pioneers and users across domains have started exploring DID use cases, which help better protect their personal data and application access control as compared to traditional, central, or federated identity management models. In this exploratory work, the authors employ qualitative secondary case-based study research methodology to understand the challenges of the current digital identity management landscape and explore the possible benefits of DID as an emerging identity management paradigm. They propose a conceptual cube framework for analysing and studying various DID platforms thereby contributing to both the theory and practice of digitally secure identity.
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii