Machine learning in identity and access management systems: Survey and deep dive

S Aboukadri, A Ouaddah, A Mezrioui - Computers & Security, 2024 - Elsevier
The evolution of identity and access management (IAM) has been driven by the expansion
of online services, cloud computing, and the Internet of Things (IoT). The proliferation of …

eID and self-sovereign identity usage: an overview

D Pöhn, M Grabatin, W Hommel - Electronics, 2021 - mdpi.com
The COVID-19 pandemic helped countries to increase the use of their mobile eID solutions.
These are based on traditional identity management systems, which suffer from …

An identity management and authentication scheme based on redactable blockchain for mobile networks

J Xu, K Xue, H Tian, J Hong, DSL Wei… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
More and more users are eager to obtain more comprehensive network services without
revealing their private information. Traditionally, in order to access a network, a user is …

Designing a cross-organizational identity management system: Utilizing SSI for the certification of retailer attributes

T Guggenberger, D Kühne, V Schlatt, N Urbach - Electronic Markets, 2023 - Springer
The introduction of blockchain offers new opportunities to rethink enterprise identity
management. Recently, a new concept has emerged in the blockchain community called …

An overview of limitations and approaches in identity management

D Pöhn, W Hommel - Proceedings of the 15th International Conference …, 2020 - dl.acm.org
Identity and access management (I&AM) is the umbrella term for managing users and their
permissions. It is required for users to access different services. These services can either be …

Providing login and Wi-Fi access services with the eIDAS network: A practical approach

DG Berbecaru, A Lioy, C Cameroni - IEEE Access, 2020 - ieeexplore.ieee.org
The digital identity (or electronic identity) of a person is about being able to prove upon
authentication who one is on the Internet, with a certain level of assurance, such as by …

System for Cross-Domain Identity Management (SCIM): Survey and Enhancement With RBAC

T Baumer, M Müller, G Pernul - IEEE Access, 2023 - ieeexplore.ieee.org
System for Cross-domain Identity Management (SCIM) is a schema and protocol to
exchange identity data across cloud-based applications utilizing a Representational State …

Electronic identity services as sociotechnical and political-economic constructs

J Van Dijck, B Jacobs - New media & society, 2020 - journals.sagepub.com
Electronic identification services (eIDs) have become strategic services in the global
governance of online societies. In this article, we argue that eIDs are sociotechnical …

Users' adoption of national digital identity systems: Human-centric cybersecurity review

M Hilowle, W Yeoh, M Grobler, G Pye… - Journal of Computer …, 2023 - Taylor & Francis
This paper establishes the current state of human-centric cybersecurity factors that influence
users' adoption of national digital identity systems (NDIDs). NDIDs are national-level security …

Blockchain usage for government-issued electronic IDs: A survey

M Kuperberg, S Kemper, C Durak - International Conference on Advanced …, 2019 - Springer
Government IDs are traditionally plastic cards or paper-based passport booklets, sometimes
with machine-readable contactless chips. Even though advanced implementations with …