Identity and access management: "Elevating security and efficiency: Unveiling the crucial aspects of identity and access management”
The foundation of the software is the identity and access management system. A fundamental and essential cybersecurity competency is ensuring that the right parties have timely access to the right resources. The IAM has four domains: IAAA stands for identification, authentication, authorization, and accounting, the second is Privileged Access Management (PAM), third-party Identity Governance and Administration, data governance and protection. In this article, the concepts of identification, authentication, authorization, and accounting are discussed, as well as how IAAA works in an online setting.
Kling J, Thompson B, Green W. IAM System Implementing Iam Data Model. US Patent 9. 2016: 529-989.
Hardt D. (2021) RFC6749—The OAuth 2.0 Authorization Framework. https://tools.ietf.org/html/rfc6749. Accessed February 18, 2021.
Hu VC, Ferraiolo D, Kuhn R, et al. Guide to attribute-based access control (abac) definition and considerations. NIST Special Publ. 2013; 800(162): 4-16. https://doi.org/10.6028/NIST.SP.800-162.
Vimercati DC, Foresti DC, Samarati SP. Authorization and access control. In: Security, Privacy, and Trust in Modern Data Management. Berlin: Springer Berlin Heidelberg; 2007: 39-53 https://doi.org/10.1007/978-3-540-69861-6_4.
Nuss M, Puchta A, Kunz M. Towards Blockchain-based identity and access management for Internet of Things in enterprises. Intern Conf Trust and Priv Digital Bus. 2018: 167-181. Accessed February 18, 2021. https://doi.org/10.1007/978-3-319-98385-1_12.
Osmanoglu E. Identity and Access Management: Business Performance Through Connected Intelligence. Newnes; 2013.
Ghaffari F, Bertin E, Hatin J, Crespi N. Authentication and access control based on distributed ledger technology: a survey. 2nd Con Blockchain Res App Inno Net Ser (BRAINS). Paris, France; 2020: 79-86. September 27, 2020. https://doi.org/10.1109/BRAINS49436.2020.9223297.
Gilani K, Bertin E, Hatin J, Crespi N. A survey on Blockchain-based identity management and decentralized privacy for personal data. 2nd Con Blockchain Res App Inno Net Ser (BRAINS). Paris, France; 2020: 97-101. September 27, 2020. https://doi.org/10.1109/BRAINS49436.2020.9223312.
Chadwick DW. Federated identity management. In: Foundations of Security Analysis and Design V: FOSAD 2007/2008/2009 Tutorial Lectures. Berlin: Heidelberg: Springer Berlin Heidelberg; 2009: 96-120. https://doi.org/10.1007/978-3-642-03829-7_3.
Clauβ S, Kesdogan D, Kölsch T. Privacy enhancing identity management: protection against re-identification and profiling. Proceedings of the 2005 workshop on Digital identity management. Seoul, Korea; 2005: 84-93. November 15, 2005. https://doi.org/10.1145/1102486.1102501.
View Full Article:
How to Cite
LicenseAuthors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under aÂ Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (SeeÂ The Effect of Open Access).