Identity and Access Management System: a Web-Based Approach for an Enterprise

KH Mohammed, A Hassan, D Yusuf Mohammed - 2018 - oer.udusok.edu.ng
Managing digital identities and access control for enterprise users and applications remains
one of the greatest challenges facing computing today. An attempt to address this issue led …

[PDF][PDF] Systematic review of identity access management in information security

IA Mohammed - … Journal of Innovations in Engineering Research …, 2017 - researchgate.net
This paper is a systematic review of Identity Access Management (IAM) in information
security. Identity and Access Administration (IAM) involves tools, procedures, and policies for …

[PDF][PDF] Intelligent authentication for identity and access management: a review paper

IA Mohammed - International Journal of Managment, IT and …, 2013 - researchgate.net
The main purpose of this paper is to explore how identity and access management systems
provide important benefits in various enterprises. Identity and access management (IAM) …

Identity and access management as security-as-a-service from clouds

DH Sharma, CA Dhote, MM Potey - Procedia Computer Science, 2016 - Elsevier
In Security-as-a-service model the focus is on security delivered as cloud services; ie
security provided through the cloud instead of on premise security solutions. Identity and …

[PDF][PDF] The interaction between artificial intelligence and identity and access management: an empirical study

IA Mohammed - … Journal of Creative Research Thoughts (IJCRT) …, 2021 - researchgate.net
The main purpose of this paper is to explore the significance of identity and access
management systems in different businesses. The IAM system typically consists of specified …

Transforming the capabilities of artificial intelligence in GCC financial sector: a systematic literature review

HU Khan, MZ Malik, MKB Alomari… - Wireless …, 2022 - Wiley Online Library
Identity and access management is a business process framework that makes it easier to
maintain genuine user identities and regulate access to sensitive assets. The word “access …

[HTML][HTML] Identity and access management in cloud environment: Mechanisms and challenges

I Indu, PMR Anand, V Bhaskar - Engineering science and technology, an …, 2018 - Elsevier
Cloud computing is a complex system with combination of diverse networked devices that
supports demanded services. The architecture of cloud computing consists of different kinds …

[PDF][PDF] Cloud computing identity management

A Gopalakrishnan - SETLabs briefings, 2009 - basconsulting.in
Latest technology facilitates different service providers to unite their efforts to address a
broader business space. It is possible that consumers hold multiple accounts with the …

Centralized end-to-end identity and access management and ERP systems: A multi-case analysis using the Technology Organization Environment framework

M Bradford, JB Earp, S Grabski - International Journal of Accounting …, 2014 - Elsevier
Abstract System security is a top issue facing global organizations. This study investigates
the constraints and benefits of a successful centralized end-to-end identity and access …

The identity crisis. security, privacy and usability issues in identity management

G Alpár, JH Hoepman, J Siljee - arXiv preprint arXiv:1101.0427, 2011 - arxiv.org
This paper studies the current" identity crisis" caused by the substantial security, privacy and
usability shortcomings encountered in existing systems for identity management. Some of …