Priyanka D. More, Sachin R. Sakhare, Parikshit Mahalle
{"title":"物联网中的身份管理:技术现状综述","authors":"Priyanka D. More, Sachin R. Sakhare, Parikshit Mahalle","doi":"10.1109/msmc.2022.3230215","DOIUrl":null,"url":null,"abstract":"The Internet of Things (IoT) facilitates connections between people and things at any time, anywhere, with anything, and with anybody through the use of any network, service, or application. The IoT is a system of actual physical objects commonly referred to as <italic xmlns:mml=\"http://www.w3.org/1998/Math/MathML\" xmlns:xlink=\"http://www.w3.org/1999/xlink\">things</i> . Things contain sensors, software, and other technologies that connect to other systems and devices over the Internet and allow data exchange. Identity management (IDM) involves managing identifiers and attributes linked to identity, and access management involves evaluating these attributes and making decisions based on policies to manage access to other objects or services. Authentication, authorization, and access control collectively represent identity access management.","PeriodicalId":43649,"journal":{"name":"IEEE Systems Man and Cybernetics Magazine","volume":"23 1","pages":"0"},"PeriodicalIF":1.9000,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Identity Management in the Internet of Things: A Survey of the State of the Art\",\"authors\":\"Priyanka D. More, Sachin R. Sakhare, Parikshit Mahalle\",\"doi\":\"10.1109/msmc.2022.3230215\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Internet of Things (IoT) facilitates connections between people and things at any time, anywhere, with anything, and with anybody through the use of any network, service, or application. The IoT is a system of actual physical objects commonly referred to as <italic xmlns:mml=\\\"http://www.w3.org/1998/Math/MathML\\\" xmlns:xlink=\\\"http://www.w3.org/1999/xlink\\\">things</i> . Things contain sensors, software, and other technologies that connect to other systems and devices over the Internet and allow data exchange. Identity management (IDM) involves managing identifiers and attributes linked to identity, and access management involves evaluating these attributes and making decisions based on policies to manage access to other objects or services. Authentication, authorization, and access control collectively represent identity access management.\",\"PeriodicalId\":43649,\"journal\":{\"name\":\"IEEE Systems Man and Cybernetics Magazine\",\"volume\":\"23 1\",\"pages\":\"0\"},\"PeriodicalIF\":1.9000,\"publicationDate\":\"2023-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Systems Man and Cybernetics Magazine\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/msmc.2022.3230215\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, CYBERNETICS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Systems Man and Cybernetics Magazine","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/msmc.2022.3230215","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, CYBERNETICS","Score":null,"Total":0}
Identity Management in the Internet of Things: A Survey of the State of the Art
The Internet of Things (IoT) facilitates connections between people and things at any time, anywhere, with anything, and with anybody through the use of any network, service, or application. The IoT is a system of actual physical objects commonly referred to as things . Things contain sensors, software, and other technologies that connect to other systems and devices over the Internet and allow data exchange. Identity management (IDM) involves managing identifiers and attributes linked to identity, and access management involves evaluating these attributes and making decisions based on policies to manage access to other objects or services. Authentication, authorization, and access control collectively represent identity access management.