To see the other types of publications on this topic, follow the link: Identity management systems.

Journal articles on the topic 'Identity management systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Identity management systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kumar, Vikas, and Aashish Bhardwaj. "Identity Management Systems." International Journal of Strategic Decision Sciences 9, no. 1 (2018): 63–78. http://dx.doi.org/10.4018/ijsds.2018010105.

Full text
Abstract:
This article describes how in today's digital world, customers have made it a common practice to maintain user accounts with different service providers to access a range of services. In such environment, all attributes of the identity must be verified to operate, otherwise the resources would be vulnerable to financial and data loss. This article contends that makes it important to form an Identity Management System, which could provide central administration, user self- service, role based access control and integrated user management. Identity Management becomes very much vital for the envi
APA, Harvard, Vancouver, ISO, and other styles
2

Tracy, Kim. "Identity management systems." IEEE Potentials 27, no. 6 (2008): 34–37. http://dx.doi.org/10.1109/mpot.2008.929295.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Backhouse, James. "Interoperability of identity and identity management systems." Datenschutz und Datensicherheit - DuD 30, no. 9 (2006): 568–70. http://dx.doi.org/10.1007/s11623-006-0145-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wayman, James L. "Biometrics in Identity Management Systems." IEEE Security & Privacy Magazine 6, no. 2 (2008): 30–37. http://dx.doi.org/10.1109/msp.2008.28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hariharan, Ramanan. "AI-Driven Identity and Access Management in Enterprise Systems." International journal of IoT 05, no. 01 (2025): 62–94. https://doi.org/10.55640/ijiot-05-01-05.

Full text
Abstract:
Identity and Access Management (IAM) is essential for cybersecurity architecture because of the increasing complexity of the digital enterprise. The research investigates how Artificial Intelligence (AI) transforms Identity and Access Management (IAM) by establishing context-aware systems that function adaptively through automated identity governance capabilities. Concepts from traditional IAM infrastructure face challenges when implementing dynamic access models because they base their function on manual processes and static policies in their design. Machine learning combined with behavioral
APA, Harvard, Vancouver, ISO, and other styles
6

Al Khouri, Ali M. "PKI in Government Identity Management Systems." International Journal of Network Security & Its Applications 3, no. 3 (2011): 69–96. http://dx.doi.org/10.5121/ijnsa.2011.3306.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Maha, Aldosary, and Alqahtani Norah. "A SURVEY ON FEDERATED IDENTITY MANAGEMENT SYSTEMS LIMITATION AND SOLUTIONS." International Journal of Network Security & Its Applications (IJNSA) 13, no. 3 (2021): 43–59. https://doi.org/10.5281/zenodo.4978701.

Full text
Abstract:
An efficient identity management system has become one of the fundamental requirements for ensuring safe, secure, and transparent use of identifiable information and attributes. Federated Identity Management (FIdM) allows users to distribute their identity information across security domains which increases the portability of their digital identities, and it is considered a promising approach to facilitate secure resource sharing among collaborating participants in heterogeneous IT environments. However, it also raises new architectural challenges and significant security and privacy issues th
APA, Harvard, Vancouver, ISO, and other styles
8

Yadav, Susheel. "Decentralizing Identity with Blockchain Technology in Digital Identity Management." Journal of Current Research in Blockchain 1, no. 3 (2024): 178–89. https://doi.org/10.47738/jcrb.v1i3.22.

Full text
Abstract:
Blockchain technology has emerged as a promising solution for digital identity verification, offering significant improvements in security, decentralization, and privacy. This study examines the application of blockchain in identity systems, focusing on the benefits and challenges it presents. The findings reveal that blockchain enhances security by 85%, decentralizes data control by 80%, and improves privacy protection by 75% compared to traditional centralized systems. Additionally, the study highlights key challenges, including regulatory uncertainty, scalability issues, and interoperabilit
APA, Harvard, Vancouver, ISO, and other styles
9

Manimaran, Praveensankar, Thiago Garrett, Leander Jehl, and Roman Vitenberg. "Decentralization trends in identity management: From federated to Self-Sovereign Identity Management Systems." Computer Science Review 58 (November 2025): 100776. https://doi.org/10.1016/j.cosrev.2025.100776.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pacyna, Piotr, Anthony Rutkowski, Amardeo Sarma, and Kenji Takahashi. "Trusted Identity for All: Toward Interoperable Trusted Identity Management Systems." Computer 42, no. 5 (2009): 30–32. http://dx.doi.org/10.1109/mc.2009.168.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Liu, Yang, Debiao He, Mohammad S. Obaidat, Neeraj Kumar, Muhammad Khurram Khan, and Kim-Kwang Raymond Choo. "Blockchain-based identity management systems: A review." Journal of Network and Computer Applications 166 (September 2020): 102731. http://dx.doi.org/10.1016/j.jnca.2020.102731.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Kshitij Varshney. "Digital Identity Management Using Biometric Systems: BioTrace." Journal of Information Systems Engineering and Management 10, no. 51s (2025): 374–85. https://doi.org/10.52783/jisem.v10i51s.10396.

Full text
Abstract:
In an increasingly digital world, establishing secure and reliable methods for verifying identity has become a critical priority across sectors such as finance, healthcare, education, and e-governance. Traditional authentication mechanisms—relying on passwords, personal identification numbers, and physical documents—are increasingly susceptible to fraud, data breaches, and user inconvenience. This paper presents a multi-modal biometric framework for digital identity management, integrating facial recognition and fingerprint verification to enhance accuracy, reduce fraud, and ensure user-centri
APA, Harvard, Vancouver, ISO, and other styles
13

Xu, Hong, Jianqing Chen, and Andrew B. Whinston. "Identity Management and Tradable Reputation." MIS Quarterly 42, no. 2 (2018): 577–93. http://dx.doi.org/10.25300/misq/2018/13634.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Gobika S. and Vaishnavi N. M.Sc., M.Phil., (Ph.D.). "Blockchain Based Identity Management System." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 1413–20. https://doi.org/10.32628/cseit25112471.

Full text
Abstract:
Traditional identity management systems often suffer from security vulnerabilities, data breaches, and inefficiencies due to centralized control. Blockchain technology offers a decentralized and tamper-resistant alternative for identity management, enhancing security, privacy, and user control. This paper explores a blockchain-based identity management system that leverages decentralized identifiers (DIDs) and verifiable credentials to provide a secure, transparent, and user-centric identity framework. The proposed system ensures data integrity, minimizes identity fraud, and enables seamless a
APA, Harvard, Vancouver, ISO, and other styles
15

L’Amrani, Hasnae, Younès EL Bouzekri EL Idrissi, and Rachida Ajhoun. "Identity Management Systems: Techno-Semantic Interoperability for Heterogeneous Federated Systems." Computer and Information Science 11, no. 3 (2018): 102. http://dx.doi.org/10.5539/cis.v11n3p102.

Full text
Abstract:
The identity management domain is a huge research domain. The federated systems proved on theirs legibility to solve a several digital identity issues. However, the problem of interoperability between federations is the researcher first issue. The researchers final goal is creating a federation of federations which is a large meta-system composed of several different federation systems. The previous researchers’ technical interoperability approach solved a part of the above-mentioned issue. However, there are some-others problems in the communication process between federated systems. In this
APA, Harvard, Vancouver, ISO, and other styles
16

Seshagiri, Asha. "METHODS FOR PREVENTING SQL INJECTION IN IDENTITY AND ACCESS MANAGEMENT (IAM) SYSTEMS." American Journal of Engineering and Technology 6, no. 10 (2024): 17–22. http://dx.doi.org/10.37547/tajet/volume06issue10-03.

Full text
Abstract:
This paper discusses methods for preventing SQL (Structured Query Language) injections in identity and access control (IAM) systems. SQL injections represent one of the most serious threats to web security, allowing attackers to gain unauthorized access to and modify data. The main security methods include filtering input data, using prepared statements and parameterization, implementing stored procedures, restricting access rights, and regularly updating software. Effective privilege management and database activity monitoring also play a key role in preventing attacks. The introduction of th
APA, Harvard, Vancouver, ISO, and other styles
17

Al zoubi, Qusay M., Yousef K. Sanjalawe, and Mohammed Anbar. "An evaluation of identity and access management systems." International Journal of Internet Technology and Secured Transactions 11, no. 1 (2021): 35. http://dx.doi.org/10.1504/ijitst.2021.10035182.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Sanjalawe, Yousef K., Mohammed Anbar, and Qusay M. Al zoubi. "An evaluation of identity and access management systems." International Journal of Internet Technology and Secured Transactions 11, no. 1 (2021): 35. http://dx.doi.org/10.1504/ijitst.2021.112868.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Wang, Feng, Ge Bao Shan, Yong Chen, et al. "Identity Authentication Security Management in Mobile Payment Systems." Journal of Global Information Management 28, no. 1 (2020): 189–203. http://dx.doi.org/10.4018/jgim.2020010110.

Full text
Abstract:
Mobile payment is a new payment method offering users mobility, reachability, compatibility, and convenience. But mobile payment involves great uncertainty and risk given its electronic and wireless nature. Therefore, biometric authentication has been adopted widely in mobile payment in recent years. However, although technology requirements for secure mobile payment have been met, standards and consistent requirements of user authentication in mobile payment are not available. The flow management of user authentication in mobile payment is still at its early stage. Accordingly, this paper pro
APA, Harvard, Vancouver, ISO, and other styles
20

Sanchez Garcia, Sergio, Ana Gomez Oliva, Emilia Perez Belleboni, and Ivan Pau de la Cruz. "Current Trends in Pan-European Identity Management Systems." IEEE Technology and Society Magazine 31, no. 3 (2012): 44–50. http://dx.doi.org/10.1109/mts.2012.2211154.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Birrell, Eleanor, and Fred B. Schneider. "Federated Identity Management Systems: A Privacy-Based Characterization." IEEE Security & Privacy 11, no. 5 (2013): 36–48. http://dx.doi.org/10.1109/msp.2013.114.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Fischer-Hübner, Simone, and Hans Hedbom. "Benefits of Privacy-Enhancing Identity Management." Asia Pacific Business Review 4, no. 4 (2008): 3–13. http://dx.doi.org/10.1177/097324700800400401.

Full text
Abstract:
Privacy-enhancing identity management systems allow users to act securely in the information society while keeping sovereignty over their personal spheres. This paper elaborates the benefits that privacy-enhancing identity management can provide for both end users and services sides. These benefits include increased privacy protection for end users and enhanced trust relations between users and services sides. The PRIME system developed within the EU project PRIME (Privacy and Identity Management for Europe) and a PRIME-enable e-shopping application scenario are used to illustrate these benefi
APA, Harvard, Vancouver, ISO, and other styles
23

Van Zoonen, Liesbet, and Georgina Turner. "Exercising identity: agency and narrative in identity management." Kybernetes 43, no. 6 (2014): 935–46. http://dx.doi.org/10.1108/k-06-2013-0126.

Full text
Abstract:
Purpose – The purpose of this paper is to address the paradox in identity management that sees people happily sharing personal information in some circumstances, such as via social networks, yet defending their right to privacy in others, such as in interactions with the state. The authors examine the predominant explanations and elaborate how these ignore the different types of individual acts and agency involved in identity management. The authors conclude with a proposal to consider alternative, narrative approaches to identity management (IM). Design/methodology/approach – This paper has b
APA, Harvard, Vancouver, ISO, and other styles
24

Alamri, Bandar, Katie Crowley, and Ita Richardson. "Cybersecurity Risk Management Framework for Blockchain Identity Management Systems in Health IoT." Sensors 23, no. 1 (2022): 218. http://dx.doi.org/10.3390/s23010218.

Full text
Abstract:
Blockchain (BC) has recently paved the way for developing Decentralized Identity Management (IdM) systems for different information systems. Researchers widely use it to develop decentralized IdM systems for the Health Internet of Things (HIoT). HIoT is considered a vulnerable system that produces and processes sensitive data. BC-based IdM systems have the potential to be more secure and privacy-aware than centralized IdM systems. However, many studies have shown potential security risks to using BC. A Systematic Literature Review (SLR) conducted by the authors on BC-based IdM systems in HIoT
APA, Harvard, Vancouver, ISO, and other styles
25

Phanireddy, Sandeep. "AI-Driven Identity Access Management (IAM)." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 05, no. 06 (2021): 1–9. https://doi.org/10.55041/ijsrem8931.

Full text
Abstract:
Organizations worldwide depend on Identity and Access Management (IAM) systems to control who can access which resources and under what conditions. However, rapid digital transformation, the shift to cloud-based services, and the rising complexity of user behaviors have challenged traditional IAM approaches. AI-driven IAM methods promise a more flexible, adaptive, and risk-sensitive framework. By applying machine learning and intelligent analytics to user patterns, device signals, and threat intelligence, these next-generation IAM systems can proactively detect anomalies, reduce manual tasks,
APA, Harvard, Vancouver, ISO, and other styles
26

Pratik Jain. "Identity and Access Management in the Cloud." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 1528–35. https://doi.org/10.32628/cseit25112523.

Full text
Abstract:
Cloud computing has revolutionized the way businesses and organizations operate, enabling scalable, flexible, and cost-effective IT infrastructures. However, as the reliance on cloud services grows, so do the challenges related to securing sensitive data and systems. Identity and Access Management (IAM) plays a crucial role in ensuring that only authorized users can access cloud resources. This paper explores the fundamental concepts of IAM in the cloud, focusing on its components, authentication mechanisms, and authorization processes. It discusses how IAM systems are structured, the various
APA, Harvard, Vancouver, ISO, and other styles
27

Khajehei, Kamyab. "Role of Identity Management Systems in Cloud Computing Privacy." International Journal of Education and Management Engineering 7, no. 3 (2017): 25–34. http://dx.doi.org/10.5815/ijeme.2017.03.03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Roßnagel, Heiko, Jan Zibuschka, Oliver Hinz, and Jan Muntermann. "Users' willingness to pay for web identity management systems." European Journal of Information Systems 23, no. 1 (2014): 36–50. http://dx.doi.org/10.1057/ejis.2013.33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Wu, Shuheng, Besiki Stvilia, and Dong Joon Lee. "Exploring researchers' participation in online research identity management systems." Proceedings of the Association for Information Science and Technology 53, no. 1 (2016): 1–6. http://dx.doi.org/10.1002/pra2.2016.14505301105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Khajehei, Kamyab. "Preserving Privacy in Cloud Identity Management Systems Using DCM (Dual Certificate Management)." International Journal of Wireless and Microwave Technologies 8, no. 4 (2018): 54–65. http://dx.doi.org/10.5815/ijwmt.2018.04.04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Herwanto, Riko, Eddy Sumartono, Didit Saputra, Salman Farizy, and Farida Hasanah. "Enhancing Cybersecurity with Blockchain-based Identity Management." Global International Journal of Innovative Research 2, no. 8 (2024): 1951–65. http://dx.doi.org/10.59613/global.v2i8.288.

Full text
Abstract:
In the digital age, the rapid increase in cyber threats has highlighted the need for more robust and secure identity management systems. Traditional centralized identity management systems are often vulnerable to data breaches, unauthorized access, and identity theft, posing significant risks to individuals and organizations. This paper explores the potential of blockchain technology to enhance cybersecurity through decentralized identity management. By leveraging the inherent properties of blockchain—such as immutability, transparency, and decentralization—blockchain-based identity management
APA, Harvard, Vancouver, ISO, and other styles
32

Zhu, Xiaoyang, and Youakim Badr. "Identity Management Systems for the Internet of Things: A Survey Towards Blockchain Solutions." Sensors 18, no. 12 (2018): 4215. http://dx.doi.org/10.3390/s18124215.

Full text
Abstract:
The Internet of Things aims at connecting everything, ranging from individuals, organizations, and companies to things in the physical and virtual world. The digital identity has always been considered as the keystone for all online services and the foundation for building security mechanisms such as authentication and authorization. However, the current literature still lacks a comprehensive study on the digital identity management for the Internet of Things (IoT). In this paper, we firstly identify the requirements of building identity management systems for IoT, which comprises scalability,
APA, Harvard, Vancouver, ISO, and other styles
33

Bouras, Mohammed Amine, Qinghua Lu, Fan Zhang, Yueliang Wan, Tao Zhang, and Huansheng Ning. "Distributed Ledger Technology for eHealth Identity Privacy: State of The Art and Future Perspective." Sensors 20, no. 2 (2020): 483. http://dx.doi.org/10.3390/s20020483.

Full text
Abstract:
Electronic healthcare (eHealth) identity management (IdM) is a pivotal feature in the eHealth system. Distributed ledger technology (DLT) is an emerging technology that can achieve agreements of transactional data states in a decentralized way. Building identity management systems using Blockchain can enable patients to fully control their own identity and provide increased confidence in data immutability and availability. This paper presents the state of the art of decentralized identity management using Blockchain and highlights the possible opportunities for adopting the decentralized ident
APA, Harvard, Vancouver, ISO, and other styles
34

Deng, Xudong, Chengliang Tian, Fei Chen, and Hequn Xian. "Designated-Verifier Anonymous Credential for Identity Management in Decentralized Systems." Mobile Information Systems 2021 (September 9, 2021): 1–15. http://dx.doi.org/10.1155/2021/2807395.

Full text
Abstract:
Most of the existing identity management is the centralized architecture that has to validate, certify, and manage identity in a centralized approach by trusted authorities. Decentralized identity is causing widespread public concern because it enables to give back control of identity to clients, and the client then has the ability to control when, where, and with whom they share their credentials. A decentralized solution atop on blockchain will bypass the centralized architecture and address the single point of the failure problem. To our knowledge, blockchain is an inherited pseudonym but i
APA, Harvard, Vancouver, ISO, and other styles
35

Jovanovic, Bojan, Ivan Milenkovic, Marija Bogicevic-Sretenovic, and Dejan Simic. "Extending identity management system with multimodal biometric authentication." Computer Science and Information Systems 13, no. 2 (2016): 313–34. http://dx.doi.org/10.2298/csis141030003j.

Full text
Abstract:
Techniques for authentication that are used in today's identity management systems are vulnerable when they are used over the network. In order to prevent fraud and unauthorized data access, it is important to ensure the identity of the person who submitted authentication credentials. The authentication process can be additionally secured by using biometric data for user verification. Moreover, precision of biometric authentication can be improved by the use of multimodal biometrics. This paper presents a system which has been designed for identity management based on FreeIPA solution for digi
APA, Harvard, Vancouver, ISO, and other styles
36

Li, Dong Mei, Yong Hong Wang, and Jian Yong Chen. "Trust Federation of Identity Management in Distributed Environment." Advanced Materials Research 605-607 (December 2012): 2574–78. http://dx.doi.org/10.4028/www.scientific.net/amr.605-607.2574.

Full text
Abstract:
Identity management systems in Internet belong to different circles of trust and it is difficult to set up trust relationship among Identity Providers (IdPs) or Service Providers (SPs) which are located in different circles of trust. This paper proposes a distributed trust federation framework to solve the problem and its efficiency is analyzed with several experiments. It uses IdPs which belong to multiple Circles of Trust (CoTs) as relay entities to set up trust relationship among CoTs. The proposed framework is effective to extend the trust federation of identity management systems and thus
APA, Harvard, Vancouver, ISO, and other styles
37

Researcher. "MODERNIZING IDENTITY MANAGEMENT: TRANSITIONING FROM LEGACY SYSTEMS TO SSO IMPLEMENTATION." International Journal of Research In Computer Applications and Information Technology (IJRCAIT) 7, no. 2 (2024): 1756–68. https://doi.org/10.5281/zenodo.14266705.

Full text
Abstract:
This article examines the critical transition from legacy identity management systems to modern Single Sign-On (SSO) implementations, highlighting the evolution of authentication frameworks and their impact on enterprise security architecture. The article investigates the challenges organizations face during migration, focusing on security enhancement, user experience improvement, and operational efficiency. Through comprehensive article analysis of current infrastructure, particularly Legacy Identity Management systems/ architectures the article identifies key limitations in meeting contempor
APA, Harvard, Vancouver, ISO, and other styles
38

Crompton, Malcolm. "User-centric identity management: An oxymoron or the key to getting identity management right?" Information Polity 15, no. 4 (2010): 291–97. http://dx.doi.org/10.3233/ip-2010-0193.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Aldosary, Maha, and Norah Alqahtani. "A Survey on Federated Identity Management Systems Limitation and Solutions." International Journal of Network Security & Its Applications 13, no. 03 (2021): 43–59. http://dx.doi.org/10.5121/ijnsa.2021.13304.

Full text
Abstract:
An efficient identity management system has become one of the fundamental requirements for ensuring safe, secure, and transparent use of identifiable information and attributes. Federated Identity Management (FIdM) allows users to distribute their identity information across security domains which increases the portability of their digital identities, and it is considered a promising approach to facilitate secure resource sharing among collaborating participants in heterogeneous IT environments. However, it also raises new architectural challenges and significant security and privacy issues th
APA, Harvard, Vancouver, ISO, and other styles
40

Beynon‐Davies, Paul. "Personal identity management and electronic government." Journal of Enterprise Information Management 20, no. 3 (2007): 244–70. http://dx.doi.org/10.1108/17410390710740727.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Ranga, Premsai. "Blockchain Technology in Identity Management: Enhancing Cybersecurity Frameworks." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 11, no. 6 (2023): 1–16. https://doi.org/10.5281/zenodo.14280061.

Full text
Abstract:
Identity management is a critical component of cybersecurity, ensuring that only authorized individuals can access sensitive systems and data. Traditional identity management systems, which rely on centralized databases, face growing challenges related to data breaches, unauthorized access, and identity theft. Blockchain technology, with its decentralized, transparent, and tamper-resistant nature, has emerged as a promising solution to enhance identity management frameworks and improve overall cybersecurity.This paper proposes a novel identity management framework leveraging blockchain technol
APA, Harvard, Vancouver, ISO, and other styles
42

Nikhil Ghadge. "Enhancing threat detection in Identity and Access Management (IAM) systems." International Journal of Science and Research Archive 11, no. 2 (2024): 2050–57. http://dx.doi.org/10.30574/ijsra.2024.11.2.0761.

Full text
Abstract:
Identity and Access Management (IAM) systems play a pivotal role in safeguarding organizational resources by controlling access to sensitive information. However, these systems face evolving threats that can compromise security and privacy. This paper proposes a comprehensive approach to enhance threat detection within IAM systems. By integrating advanced techniques such as anomaly detection, machine learning, and behavior analysis, organizations can better identify and respond to suspicious activities. This paper discusses the challenges associated with threat detection in IAM systems and pre
APA, Harvard, Vancouver, ISO, and other styles
43

Journal, of Global Research in Multidisciplinary Studies(JGRMS). "Blockchain for Secure Identity Management: A Review on Decentralized Authentication Systems." Journal of Global Research in Multidisciplinary Studies(JGRMS) 01, no. 02 (2025): 01–06. https://doi.org/10.5281/zenodo.15245191.

Full text
Abstract:
The rise of blockchain technology has revolutionized identity management by introducing decentralized, secure, and user-centric systems. The capacity of blockchain-based identity management solutions to circumvent the drawbacks of conventional centralized approaches is the primary emphasis of this analysis. Here, we take a look at several important ideas like decentralized trustworthy identity (DTI) and self-sovereign identity (SSI), and we see how they improve privacy and security while giving users more powers over their own data. The paper also analyzes the role of cryptographic protocols,
APA, Harvard, Vancouver, ISO, and other styles
44

Ramakrishnan, Shanmugavelan. "Enhancing Incident Detection and Response through Zero Trust Implementation in Identity and Access Management Systems." International Journal of Science and Research (IJSR) 10, no. 12 (2021): 1480–85. http://dx.doi.org/10.21275/sr24314030143.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Kyaw, Soe Moe, and Mya Thwe Mya. "Investigation of Blockchain Based Identity System for Privacy Preserving University Identity Management System." International Journal of Trend in Scientific Research and Development 3, no. 6 (2019): 336–41. https://doi.org/10.5281/zenodo.3587851.

Full text
Abstract:
Existing blockchain based identity systems are analyzed under the context of the university identity management requirements. The private or consortium blockchain is more suitable for identity system which will be used for university. The transparency of public blockchains raises some concerns for privacy and confidentiality. The most important issue is that the volume of the data generated can be very large exceeding the practical storage capabilities of the current blockchain usages. The existing identity systems are not well fixed with the university identity management system really needs,
APA, Harvard, Vancouver, ISO, and other styles
46

GOMI, Hidehito. "Authentication Trust Metric and Assessment for Federated Identity Management Systems." IEICE Transactions on Information and Systems E95-D, no. 1 (2012): 29–37. http://dx.doi.org/10.1587/transinf.e95.d.29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Waleed A. Alrodhan. "Enhancing User Privacy in Information Card-Based Identity Management Systems." International Journal of Engineering and Industries 2, no. 3 (2011): 76–85. http://dx.doi.org/10.4156/ijei.vol2.issue3.8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Vulic, Marko, Marko Rankovic, and Vojkan Vaskovic. "Identity Management In Modern Business - An Example Of Cloud Systems." Management - Journal for theory and practice of management 17, no. 63 (2012): 55–62. http://dx.doi.org/10.7595/management.fon.2012.0008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Devlekar, Sanket, and Vidyavati Ramteke. "Identity and Access Management: High-level Conceptual Framework." Revista Gestão Inovação e Tecnologias 11, no. 4 (2021): 4885–97. http://dx.doi.org/10.47059/revistageintec.v11i4.2511.

Full text
Abstract:
Information security is shifting from a traditional perimeter-based approach to an identity-based approach where the organization's boundaries are where their digital identities exist. The organization has multiple stakeholders having access to various organization resources. Systems and applications are part of organization resources that help them achieve their business goals. These systems and applications are internally or externally exposed to allow all stakeholders to have seamless access, thus making identity and access management a big challenge. Identity and Access Management (IAM) is
APA, Harvard, Vancouver, ISO, and other styles
50

S., Devlekar,, and Ramteke, V. "Identity and Access Management: High-level Conceptual Framework." CARDIOMETRY, no. 24 (November 30, 2022): 393–99. http://dx.doi.org/10.18137/cardiometry.2022.24.393399.

Full text
Abstract:
Information security is shifting from a traditional perimeter-based approach to an identity-based approach where the organization’s boundaries are where their digital identities exist. The organization has multiple stakeholders having access to various organization resources. Systems and applications are part of organization resources that help them achieve their business goals. These systems and applications are internally or externally exposed to allow all stakeholders to have seamless access, thus making identity and access management a big challenge. Identity and Access Management (IAM) is
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!