To see the other types of publications on this topic, follow the link: Identity access management.

Dissertations / Theses on the topic 'Identity access management'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 42 dissertations / theses for your research on the topic 'Identity access management.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Fryaufová, Lucie. "Řízení identit v organizacích." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-162629.

Full text
Abstract:
The topic of this thesis is focused on the issues of the Identity Management. The author of the work describes the possibilities using this concept and application Identity Management in organizations. This issue is not oriented just from the point of Information security where this area belongs. The goal of this work is to create a framework of the process Identity Management by using best practises and standards. The context of the work should describe new trends and using special tools for safety work with process of Identity Management and the risk in area of the Identity Management. To ac
APA, Harvard, Vancouver, ISO, and other styles
2

Jaferian, Pooya. "User-centered design of identity and access management systems." Thesis, University of British Columbia, 2014. http://hdl.handle.net/2429/51243.

Full text
Abstract:
IT security management (ITSM) technologies are important components of IT security in organizations. But there has been little research on how ITSM technologies should incorporate human and social issues into their design. Identity and Access Management (IAM) systems, as an important category of ITSM, share such a gap with other ITSM technologies. The overreaching goal of this research is to narrow the gap between IAM technologies and social context. In the first phase, we developed a set of usability guidelines, and heuristics for design and usability evaluation of ITSM tools. We gathered re
APA, Harvard, Vancouver, ISO, and other styles
3

Kotora, Ondřej. "Centralizovaná správa rolí." Master's thesis, Vysoká škola ekonomická v Praze, 2008. http://www.nusl.cz/ntk/nusl-3371.

Full text
Abstract:
Správa rolí a identit se stává elementární součástí podnikových informačních systémů. Je součástí oboru Identity a Access managementu, který je velmi mladou a dynamicky se rozvíjející tržní oblastí. Tato diplomová práce poskytuje základní přehled o členění této tržní oblasti a zároveň charakterizuje tuto oblast z pohledu obecného přístupu a přístupu na úrovni odvětví. Je zde popsána nabídka několika hlavních hráčů na trhu s důrazem na vhodnost nasazení v českém prostředí. Konkrétně je vybírán vhodný produkt pro nasazení v České správě sociálního zabezpečení, největší finančně správní institucí
APA, Harvard, Vancouver, ISO, and other styles
4

Rhermini, Siham. "Identity, Access Management and Single Sign-On Web-based Solutions." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-92235.

Full text
Abstract:
The systems' complexity growth over wide networks has increased the need for a centralized access control and strong authentication methods. And because systems have become increasingly distributed, additional need for single sign on solutions have become even more relevant. The aim of this study is to draw the state of the art on strong authentication solutions for protecting resources over networks and establish an evaluation summary of all the solutions presented. The study also presents the single sign on functionality and different architectures to implement it. This study contains a mark
APA, Harvard, Vancouver, ISO, and other styles
5

Hummer, Matthias [Verfasser], Günther [Akademischer Betreuer] Pernul, and Dogan [Akademischer Betreuer] Kesdogan. "Sustainable Identity and Access Management / Matthias Hummer ; Günther Pernul, Dogan Kesdogan." Regensburg : Universitätsbibliothek Regensburg, 2019. http://d-nb.info/1189905426/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hummer, Matthias Verfasser], Günther [Akademischer Betreuer] [Pernul, and Dogan [Akademischer Betreuer] Kesdogan. "Sustainable Identity and Access Management / Matthias Hummer ; Günther Pernul, Dogan Kesdogan." Regensburg : Universitätsbibliothek Regensburg, 2019. http://nbn-resolving.de/urn:nbn:de:bvb:355-epub-403116.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Deas, Matthew Burns. "Towards a user centric model for identity and access management within the online environment." Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/775.

Full text
Abstract:
Today, one is expected to remember multiple user names and passwords for different domains when one wants to access on the Internet. Identity management seeks to solve this problem through creating a digital identity that is exchangeable across organisational boundaries. Through the setup of collaboration agreements between multiple domains, users can easily switch across domains without being required to sign in again. However, use of this technology comes with risks of user identity and personal information being compromised. Criminals make use of spoofed websites and social engineering tech
APA, Harvard, Vancouver, ISO, and other styles
8

Filipsson, Emma. "Modelling and simulating Identity and Access Management based lateral movement in a cloud infrastructure." Thesis, KTH, Fysik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-252836.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Engström, Pontus. "Exploring the non-technical challenges : A case study of identity and access management projects." Thesis, KTH, Skolan för industriell teknik och management (ITM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-256228.

Full text
Abstract:
The implementation of an Identity and Access Management (IAM) solution is a complex process to manage, consuming multiple years and involves organizational changes. In its nature, several challenges tend to appear to different stakeholders involved in the process. However, prior research has mainly addressed the technical components of an IAM-solution, hence the technical challenges that emerge during development and implementation. Therefore, the non-technical challenges of the IAM-project work and the challenges that constitute the client implementation are understudied. The purpose of this
APA, Harvard, Vancouver, ISO, and other styles
10

Callahan, Michael John. "Exploring Identity Management at Community Colleges in Texas with Open Access to College Computer Networks." ScholarWorks, 2011. https://scholarworks.waldenu.edu/dissertations/1641.

Full text
Abstract:
The study addressed the lack of identity management practices in Texas community colleges to identify guest users who access college computers. Guest user access is required by Texas law and is part of the state's mission to bridge the technology gap; however, improper identification methods leave the college vulnerable to liability issues. The purpose of this study was to eliminate or mitigate liabilities facing colleges by creating and using security policies to identify guest users. This study combined the theoretical concepts of Cameron's internal security management model with the externa
APA, Harvard, Vancouver, ISO, and other styles
11

Khodaei, Mohammad. "Secure and Privacy Preserving Vehicular Communication Systems: Identity and Credential Management Infrastructure." Licentiate thesis, KTH, Kommunikationsnät, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-193030.

Full text
Abstract:
Vehicular Communication (VC) systems can greatly enhance road safety and transportation efficiency. Vehicles are equipped with sensors to sense their surroundings and the internal Controller Area Network (CAN) bus. Hence, vehicles are becoming part of a large-scale network, the so-called Internet of Vehicles (IoV). Deploying such a large-scale VC system cannot materialize unless the VC systems are secure and do not expose their users’ privacy. Vehicles could be compromised or their sensors become faulty, thus disseminating erroneous information across the network. Therefore, participating vehi
APA, Harvard, Vancouver, ISO, and other styles
12

Elhindi, Mohamed A. "Design and Development of an Identity Management System: The Minnesota State College-Southeast Technical Case Study." NSUWorks, 2010. http://nsuworks.nova.edu/gscis_etd/144.

Full text
Abstract:
Historically, managing access to information systems (ISs) required direct interaction with a limited number of users. Increasingly, managing access involves handling an increased numbers of internal and external students, faculty, and staff as well as partners such as workforce development centers, the U.S. Department of Education, and the Council on Higher Education Accreditation. At Minnesota State Colleges and Universities (MnSCU), the approach to identity management (IdM) required the distribution of a username and password to authenticate MnSCU employees and students. Authentication enab
APA, Harvard, Vancouver, ISO, and other styles
13

Hruška, David. "Návrh změn identity managementu v podniku." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2018. http://www.nusl.cz/ntk/nusl-378329.

Full text
Abstract:
This diploma thesis focuses on the proposal to implement changes of identity management into a particular company. In the theoretical part are the basic concepts and a detailed description of the identity management. There is also described an analysis of the current state of information security in the company, risk analysis and selection of measures to minimize the risks found. At the end of this thesis are proposed changes, their procedure and timetable for implementation of selected measures.
APA, Harvard, Vancouver, ISO, and other styles
14

Alotaibi, Sara Jeza. "Towards a framework and model for acceptable user experiences in e-government physical and virtual identity access management systems." Thesis, University of Southampton, 2013. https://eprints.soton.ac.uk/365154/.

Full text
Abstract:
The wide spread of services on the internet has aggravated the issue of maintaining multiple identities such as the virtual identities that are based on specific login credentials like username, passwords and PINs. On the other hand, multiple physical identities also prove to be difficult to maintain since different sources require the presence of different smart cards, mobile devices or other proofs of identity. Therefore, the modern world is populated with so many virtual and physical Identity Access Management Systems (IAMS) that individuals are required to maintain multiple passwords and l
APA, Harvard, Vancouver, ISO, and other styles
15

Nop, Dominik. "Vylepšení architektury systému správy identit ve firmě." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2019. http://www.nusl.cz/ntk/nusl-399861.

Full text
Abstract:
The master thesis focuses on assessment of current implementation of identity management system and proposal of a new implementation to increase level of stability and information security in the company, primarily regarding the systems that process financial data. In first part, basic theoretical knowledge related to identity management systems is defined. In second part, an analysis of current system state is performed. Based on this analysis, new organizational and technical solutions are proposed to the company. Finally, an implementation project proposal as well as with risk analysis and
APA, Harvard, Vancouver, ISO, and other styles
16

Marques, Bruno Manuel Rosas. "Gestão de identidades corporativas numa empresa de telecomunicações." Master's thesis, Instituto Superior de Economia e Gestão, 2012. http://hdl.handle.net/10400.5/10972.

Full text
Abstract:
Mestrado em Gestão de Sistemas de Informação<br>A Gestão de Identidades Corporativas (identificada na literatura como Identity and Access Management ou pelas siglas IAM, I&AM ou ainda IdM) é, para muitas empresas, um tema difícil de endereçar devido à complexidade dos seus múltiplos sistemas de informação. Muitas vezes colocam-se questões relativas às funções de negócio que cada colaborador executa na organização, acerca de quais os acessos e permissões a sistemas de que realmente necessita para o seu trabalho e quais as permissões que atualmente possui. Dar uma resposta precisa a estas questõ
APA, Harvard, Vancouver, ISO, and other styles
17

Hummer, Waldemar, Patrick Gaubatz, Mark Strembeck, Uwe Zdun, and Schahram Dustdar. "Enforcement of Entailment Constraints in Distributed Service-Based Business Processes." Elsevier, 2013. http://dx.doi.org/10.1016/j.infsof.2013.05.001.

Full text
Abstract:
A distributed business process is executed in a distributed computing environment. The service-oriented architecture (SOA) paradigm is a popular option for the integration of software services and execution of distributed business processes. Entailment constraints, such as mutual exclusion and binding constraints, are important means to control process execution. Mutually exclusive tasks result from the division of powerful rights and responsibilities to prevent fraud and abuse. In contrast, binding constraints define that a subject who performed one task must also perform the corresponding bo
APA, Harvard, Vancouver, ISO, and other styles
18

Alhaqbani, Bandar Saleh. "Privacy and trust management for electronic health records." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/37635/1/Bandar_Alhaqbani_Thesis.pdf.

Full text
Abstract:
Establishing a nationwide Electronic Health Record system has become a primary objective for many countries around the world, including Australia, in order to improve the quality of healthcare while at the same time decreasing its cost. Doing so will require federating the large number of patient data repositories currently in use throughout the country. However, implementation of EHR systems is being hindered by several obstacles, among them concerns about data privacy and trustworthiness. Current IT solutions fail to satisfy patients’ privacy desires and do not provide a trustworthiness meas
APA, Harvard, Vancouver, ISO, and other styles
19

Vokálek, Vojtěch. "Návrh změn systému řízení identit ve firmě." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-241649.

Full text
Abstract:
The subject of the Master thesis is to explore the integration of Identity Management System with the Information Security Management System based on theoretical knowledge and analysis of the current situation. Notify the company to gaps and make proposals for improvement.
APA, Harvard, Vancouver, ISO, and other styles
20

Toufanpanah, Monir. "Decision Support framework: Reliable Federated Single Sign-on." Thesis, Luleå tekniska universitet, Datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-62594.

Full text
Abstract:
Identity management is a critical concept for enterprises, and it has turned to more challenging issue since businesses are significantly moving towards service oriented architecture (SOA) with the aim to provide seamless service delivery to their customers, partners and employees. The organizational domains are expanded to blur the virtual borders, simplify the business collaboration and maximize opportunities in the competitive market place, which explicitly shows the essentiality for federating the identities. Real-world identity comprises of different dimensions such as Law, Business, Poli
APA, Harvard, Vancouver, ISO, and other styles
21

Ribeiro, Matheus Antônio Corrêa. "Gerenciamento e autenticação de identidades digitais usando feições faciais." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2008. http://hdl.handle.net/10183/15740.

Full text
Abstract:
Em nossa vida diária, são utilizadas identidades digitais (IDDs) para acessar contas de e-mail, bancos e lojas virtuais, locais restritos, computadores compartilhados, e outros. Garantir que apenas usuários autorizados tenham o acesso permitido é um aspecto fundamental no desenvolvimento destas aplicações. Atualmente, os métodos de controle de acesso simples como senhas ou números de identificação pessoal não devem ser considerados suficientemente seguros, já que um impostor pode conseguir estas informações sem o conhecimento do usuário. Ainda, no caso de utilização de dispositivos físicos com
APA, Harvard, Vancouver, ISO, and other styles
22

Grešša, Pavol. "Vícedimenzionální přístup k WWW aplikacím." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-236997.

Full text
Abstract:
This master's thesis deals with the analysis, design and implementation of authentication and authorization subsystem into the environment of distributed web application. It unifies the well-known security models into the one universal security model that can be used for the development of authorization device enabling the user to secure the applications with various security models. Furthermore, it applies this integration of models into the Takeplace system.
APA, Harvard, Vancouver, ISO, and other styles
23

Diop, Mamadou Abdoulaye. "Analyse haute performance de masses de données; application à la détection d'anomalie dans le contexte de la gestion d'identité et d'accès." Electronic Thesis or Diss., université Paris-Saclay, 2021. http://www.theses.fr/2021UPASG100.

Full text
Abstract:
La protection des données est une question essentielle en matière de cybersécurité. Les organisations utilisent les logiciels de gestion des identités et des accès et les outils de cybersécurité traditionnels pour protéger leurs actifs informationnels contre les menaces externes. Cependant, elles manquent le plus souvent de solutions pour contrer les menaces internes provenant principalement des personnes ayant un accès légitime aux systèmes d'information de l'entreprise. Ce type de menaces est aujourd'hui la principale préoccupation des spécialistes de la cybersécurité. Les logiciels d'analys
APA, Harvard, Vancouver, ISO, and other styles
24

Bouchami, Ahmed. "Sécurité des ressources collaboratives dans les réseaux sociaux d'entreprise." Thesis, Université de Lorraine, 2016. http://www.theses.fr/2016LORR0091/document.

Full text
Abstract:
Les réseaux sociaux d’entreprise (RSE) ont révolutionné la collaboration entre les organisations professionnelles. Grâce aux RSEs, les contraintes classiques de mobilité, de procédures compliquées d’échange de services et de manque de flexibilité et de communication en matière de cercles collaboratifs ne sont plus d’actualité. Dans cette thèse, nous avons travaillé sur le projet OpenPaaS RSE. Principalement nous nous sommes focalisés sur la partie gestion du contrôle d’accès, qui nous a conduit vers d’autres besoins, à savoir la gestion des identités numériques et leurs supervisions. Nous avon
APA, Harvard, Vancouver, ISO, and other styles
25

Bouchami, Ahmed. "Sécurité des ressources collaboratives dans les réseaux sociaux d'entreprise." Electronic Thesis or Diss., Université de Lorraine, 2016. http://www.theses.fr/2016LORR0091.

Full text
Abstract:
Les réseaux sociaux d’entreprise (RSE) ont révolutionné la collaboration entre les organisations professionnelles. Grâce aux RSEs, les contraintes classiques de mobilité, de procédures compliquées d’échange de services et de manque de flexibilité et de communication en matière de cercles collaboratifs ne sont plus d’actualité. Dans cette thèse, nous avons travaillé sur le projet OpenPaaS RSE. Principalement nous nous sommes focalisés sur la partie gestion du contrôle d’accès, qui nous a conduit vers d’autres besoins, à savoir la gestion des identités numériques et leurs supervisions. Nous avon
APA, Harvard, Vancouver, ISO, and other styles
26

Wild, Stefan. "Enhancing Security in Managing Personal Data by Web Systems." Doctoral thesis, Universitätsbibliothek Chemnitz, 2017. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-qucosa-217284.

Full text
Abstract:
Web systems have become an integral part in daily life of billions of people. Social is a key characteristic today’s web projects need to feature in order to be successful in the social age. To benefit from an improved user experience, individual persons are continually invited to reveal more and more personal data to web systems. With a rising severity of attacks on web systems, it is evident that their security is inadequate for the amount of accumulated personal data. Numerous threat reports indicate that social media has become a top-ranking attack target, with climbing impacts, with ramif
APA, Harvard, Vancouver, ISO, and other styles
27

Howard, Larissa Ann. "Comparing the Accept Identify Move Curriculum to Typical Classroom Behavior Management Strategies." OpenSIUC, 2019. https://opensiuc.lib.siu.edu/theses/2507.

Full text
Abstract:
Schools implement school-wide positive behavior support systems to enforce rules, shape maladaptive behaviors, and promote positive climate where students’ wellbeing can improve. A way to reduce disruptive behaviors is with Accept. Identify. Move (AIM) curriculum with reinforcement system and social-emotional components. Statistical t-test of between group of Intervention Classroom and Control Classroom, within Intervention Classroom group, and within Control Classroom group to evaluate changes in psychological flexibility changes after students received the AIM intervention and control classr
APA, Harvard, Vancouver, ISO, and other styles
28

Masmoudi, Souha. "Malleable privacy-enhancing-technologies for privacy-preserving identity management systems." Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAS023.

Full text
Abstract:
Les identités numériques sont, de nos jours, utilisées à grande échelle (par exemple, dans les services publics, les réseaux sociaux, le travail, etc.). Cela n'est pas sans poser des défis d'utilisabilité car les utilisateurs sont contraints de gérer de multiples identités et attributs pour des objectifs de contrôle d'accès et de partage de données.En outre, se posent des défis en sécurité et respect de la vie privée du fait que les entités en interaction, celles qui délivrent, traitent et collectent ces identités peuvent du fait de leur comportement ou d'insuffisances de sécurité aboutir aux
APA, Harvard, Vancouver, ISO, and other styles
29

Wild, Stefan. "Enhancing Security in Managing Personal Data by Web Systems." Universitätsverlag Chemnitz, 2016. https://monarch.qucosa.de/id/qucosa%3A20629.

Full text
Abstract:
Web systems have become an integral part in daily life of billions of people. Social is a key characteristic today’s web projects need to feature in order to be successful in the social age. To benefit from an improved user experience, individual persons are continually invited to reveal more and more personal data to web systems. With a rising severity of attacks on web systems, it is evident that their security is inadequate for the amount of accumulated personal data. Numerous threat reports indicate that social media has become a top-ranking attack target, with climbing impacts, with ramif
APA, Harvard, Vancouver, ISO, and other styles
30

Kouicem, Djamel Eddine. "Sécurité de l’Internet des objets pour les systèmes de systèmes." Thesis, Compiègne, 2019. http://www.theses.fr/2019COMP2518.

Full text
Abstract:
L'internet des objets (IoT) est une nouvelle technologie qui vise à connecter des milliards d'objets physiques à Internet. Ces objets peuvent être engagés dans des relations complexes, notamment la composition et la collaboration avec d'autres systèmes indépendants et hétérogènes, afin de fournir de nouvelles fonctionnalités, conduisant ainsi à ce que l'on appelle les systèmes de systèmes (SoS). Les composants de l'IoT communiquent et collaborent dans des environnements distribués et dynamiques, confrontés à plusieurs problèmes de sécurité de grande ampleur. La sécurité es tconsidérée parmi le
APA, Harvard, Vancouver, ISO, and other styles
31

Berrios-Ayala, Mark. "Brave New World Reloaded: Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities." Honors in the Major Thesis, University of Central Florida, 2013. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/1547.

Full text
Abstract:
Imagine a world where someone’s personal information is constantly compromised, where federal government entities AKA Big Brother always knows what anyone is Googling, who an individual is texting, and their emoticons on Twitter. Government entities have been doing this for years; they never cared if they were breaking the law or their moral compass of human dignity. Every day the Federal government blatantly siphons data with programs from the original ECHELON to the new series like PRISM and Xkeyscore so they can keep their tabs on issues that are none of their business; namely, the personal
APA, Harvard, Vancouver, ISO, and other styles
32

Faraji, MohammadSadegh. "Identity and Access Management in Multi-tier Cloud Infrastructure." Thesis, 2013. http://hdl.handle.net/1807/42833.

Full text
Abstract:
The SAVI IAM is an identity and access management system for the Multi-tier cloud infrastructure. The goal of the SAVI IAM is to provide a exible system to enable applications to adopt the cloud rapidly rather than concentrating on a speci c function such as federation. The SAVI IAM distinguishes itself from previous work in three aspects: comprehensiveness, stability, and technology independence.The SAVI IAM is a comprehensive solution for cloud providers. It uses two ne-grained access control model: constrained Role-based Access Control and Attribute-based access control. To address applic
APA, Harvard, Vancouver, ISO, and other styles
33

Huang, Chao-Chi, and 黃昭棋. "A Federated Identity Assurance and Access Management System for Cloud Computing." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/kahvpa.

Full text
Abstract:
博士<br>國立臺北科技大學<br>機電科技研究所<br>99<br>Cloud computing is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet.However, cloud computing services are still in a developmental stage; cloud computing best practices are evolving, and security is still a major concern. Furthermore, the traditional Identity and Access Management (IAM) approach cannot fit into a cloud computing platform, because the enterprise does not control the cloud service provider’s IAM practices and has even less influence over strict security practices. Th
APA, Harvard, Vancouver, ISO, and other styles
34

Chang, Hsiang-Meng, and 張翔猛. "Considering Efficiency and System Diversity in Federated Identity and Access Management Systems." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/58026655143267878748.

Full text
Abstract:
碩士<br>國立臺灣科技大學<br>資訊管理系<br>97<br>With the rapid development of information technology, organizations utilize more and more information services. However, the inconvenience of repeated log-in and the cost of managing services also increase with the growth of information services. Therefore, people proposed Single Sign-On (SSO) to enable users to access multiple services with single identity. Moreover, Federated Identity and Access Management (FIAM) systems extend SSO to provide fine-granularity access control and cross-organizational solution. Current FIAM systems emphasize the performance whe
APA, Harvard, Vancouver, ISO, and other styles
35

Wang, Ming-guo, and 王明國. "FEDERACY: AN EXTENSIBLE FEDERATED IDENTITY AND ACCESS MANAGEMENT FRAMEWORK CONSIDERING LEGACY SYSTEMS." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/67701188594218719361.

Full text
Abstract:
碩士<br>國立臺灣科技大學<br>資訊管理系<br>96<br>In recent years, many organizations start to deploy Identity and Access Management (IAM) or Federated Identity and Access Management (FIAM) systems to reduce the cost and security risks of using and managing different systems. While deploying the IAM or FIAM systems, organizations may usually meet difficulties in integrating legacy systems into IAM or FIAM systems. Current IAM solutions usually adopt the Web-based portal approach and require application system to support the Web-based architecture or HTTP protocol. In light of this, we propose the framework of
APA, Harvard, Vancouver, ISO, and other styles
36

Moura, Pedro Miguel Freitas. "Identity Management and Authorization Infrastructure in Secure Mobile Access to Electronic Health Records." Master's thesis, 2018. http://hdl.handle.net/10400.6/9527.

Full text
Abstract:
We live in an age of the mobile paradigm of anytime/anywhere access, as the mobile device is the most ubiquitous device that people now hold. Due to their portability, availability, easy of use, communication, access and sharing of information within various domains and areas of our daily lives, the acceptance and adoption of these devices is still growing. However, due to their potential and raising numbers, mobile devices are a growing target for attackers and, like other technologies, mobile applications are still vulnerable. Health information systems are composed with tools and soft
APA, Harvard, Vancouver, ISO, and other styles
37

YANG, KAI-TAI, and 楊開太. "Design and Application of NFC-based Identity and Access Management in the Cloud Services." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/479wz4.

Full text
Abstract:
碩士<br>東吳大學<br>資訊管理學系<br>105<br>In response to a changing world and the fast growth of the Internet, more and more enterprises are replacing web-based services with cloud-based ones. Multi-tenancy technology is getting more important especially with Software as a Service (SaaS). This, in turn, leads to a greater focus on the application of Identity and Access Management (IAM). Conventional Near-Field Communication (NFC)-based verification relies on a computer browser and a card reader to access an NFC tag. This type of verification does not support mobile device login and user based access mana
APA, Harvard, Vancouver, ISO, and other styles
38

Rasoolzadeh, Layla. "Science faculty access management of e-learning using Shibboleth." Master's thesis, 2008. http://hdl.handle.net/10451/14025.

Full text
Abstract:
Nowadays e-learning is greatly used in universities and other organizations all over the world. E-learning emerged as a powerful way of making the learner?s information accessible in a setting free from time and place constraints. This thesis introduces a technical way to increase the quality of an e-learning system and Content Management Systems in the Integration of e-learning tools with the existing management systems, such as Shibboleth. Shibboleth is an Internet2/MACE project with IBM financial support, developing architectures and technologies to support inter-organizational sharing of r
APA, Harvard, Vancouver, ISO, and other styles
39

"Ethnic Identity as a Moderator for Perceived Access to Healthcare Among LMSM." Master's thesis, 2020. http://hdl.handle.net/2286/R.I.57410.

Full text
Abstract:
abstract: The Centers for Disease Control and Prevention (2017) note that gay, bisexual, and other men who have sex with men (collectively referred to as MSM) face more barriers to accessing health care compared to other men. Such barriers include, lack of cultural- and sexual identity-appropriate medical and support services, concerns about confidentiality, and fear of discussing sexual practices or orientation in a medical setting. In comparison to other MSM populations, Latino MSM (LMSM) report having the least amount of access to health care (McKirnan et al., 2012). The purpose of the pres
APA, Harvard, Vancouver, ISO, and other styles
40

MAXA, Karel. "Systém správy identit pro malé a střední firmy." Master's thesis, 2014. http://www.nusl.cz/ntk/nusl-180579.

Full text
Abstract:
The topic of this master's thesis is development of identity management solution for small and medium business. The thesis is divided into four major parts. The first part contains theoretical background as description of RBAC model or model with relationships between practically used objects (user identity, role, position, permission, account...). Analysis of functioning and needs of targeted organizations was carried out in the second part. The third part describes the design of the developed application. The fourth part discusses actual implementation of the application. The main outcome of
APA, Harvard, Vancouver, ISO, and other styles
41

Dobrík, Jakub. "Implementácia Identity Access Managementu v bankovom sektore." Master's thesis, 2018. http://www.nusl.cz/ntk/nusl-429382.

Full text
Abstract:
This thesis documents the process of creating fully automated and autonomous robot, which will provide the creation of accesses to company's information systems and applications. The thesis contains the analysis of current state, which is the base for a design of a new solution that follows. The design is composed of creating new, as well as editing the current processes for creating accesses. Subsequently, the creation and configuration of an email server, as part of the solution, is described. Next follows the implementation of robot itself, using the tool BluePrism. The thesis is ended by t
APA, Harvard, Vancouver, ISO, and other styles
42

(6620474), Denis A. Ulybyshev. "Data Protection in Transit and at Rest with Leakage Detection." Thesis, 2019.

Find full text
Abstract:
<p>In service-oriented architecture, services can communicate and share data among themselves. This thesis presents a solution that allows detecting several types of data leakages made by authorized insiders to unauthorized services. My solution provides role-based and attribute-based access control for data so that each service can access only those data subsets for which the service is authorized, considering a context and service’s attributes such as security level of the web browser and trust level of service. My approach provides data protection in transit and at rest for both centralized
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!