An evaluation of identity and access management systems

Yousef K. Sanjalawe, Mohammed Anbar, Qusay M. Al-zoubi
{"title":"An evaluation of identity and access management systems","authors":"Yousef K. Sanjalawe, Mohammed Anbar, Qusay M. Al-zoubi","doi":"10.1504/IJITST.2021.10035182","DOIUrl":null,"url":null,"abstract":"One of the most critical issues of all of networks types that integrate the both of wired and wireless technologies is the performance and applicability of the electronic authentication and identification techniques. These schemes involve various technologies of different levels of security. This research presents a comparative study of six IDAM available tools, based on the three characteristics (ease of use, usefulness, and user's satisfaction), which build targets to be achieved in order to gain quality in software. The tools compared in this study are Log Mote, Oracle ID management, Tivoli Identity Manager, NetIQ-Novell, Access Sentinel, and Active Directory. In order to enable users to access the available resources in a secure way, we propose a novel architecture of IDAM. The proposed architecture basically has several advantages like, autonomy, comprehensive and systematic, standardization, and scalability.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2021-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Internet Technology and Secured Transactions","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/IJITST.2021.10035182","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 0

Abstract

One of the most critical issues of all of networks types that integrate the both of wired and wireless technologies is the performance and applicability of the electronic authentication and identification techniques. These schemes involve various technologies of different levels of security. This research presents a comparative study of six IDAM available tools, based on the three characteristics (ease of use, usefulness, and user's satisfaction), which build targets to be achieved in order to gain quality in software. The tools compared in this study are Log Mote, Oracle ID management, Tivoli Identity Manager, NetIQ-Novell, Access Sentinel, and Active Directory. In order to enable users to access the available resources in a secure way, we propose a novel architecture of IDAM. The proposed architecture basically has several advantages like, autonomy, comprehensive and systematic, standardization, and scalability.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
身份和访问管理系统的评估
在所有集成有线和无线技术的网络类型中,最关键的问题之一是电子认证和识别技术的性能和适用性。这些方案涉及不同安全级别的各种技术。本研究基于三个特征(易用性,有用性和用户满意度)对六个IDAM可用工具进行了比较研究,这些特征构建了为了获得软件质量而要实现的目标。本研究中比较的工具是Log Mote、Oracle ID管理、Tivoli Identity Manager、NetIQ-Novell、Access Sentinel和Active Directory。为了使用户能够安全地访问可用资源,我们提出了一种新的IDAM架构。所提出的体系结构基本上具有自主性、全面性和系统性、标准化和可扩展性等优点。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
International Journal of Internet Technology and Secured Transactions
International Journal of Internet Technology and Secured Transactions Computer Science-Computer Networks and Communications
CiteScore
2.50
自引率
0.00%
发文量
31
期刊最新文献
Performance analysis of consensus protocols in distributed systems Security of internet of vehicles in smart cities: authentication and confidentiality aspects Analysis of blockchain based smart contract system to understand its performance in different applications TRO-CP-ABE: a secure and flexible layer with traceability and easy revocation in ciphertext-policy attribute-based encryption A contemporary anti-phishing framework based on visual cryptography and steganography
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1