scholarly journals A Multi-Factor Authentication-Based Framework for Identity Management in Cloud Applications

2022 ◽  
Vol 71 (2) ◽  
pp. 3193-3209
Author(s):  
Wael Said ◽  
Elsayed Mostafa ◽  
M. M. Hassan ◽  
Ayman Mohamed Mostafa
2021 ◽  
Author(s):  
Zhihao Zheng ◽  
Yao Zhang ◽  
Vinay Gurram ◽  
Jose Salazar Useche ◽  
Isabella Roth ◽  
...  

At present, the development and innovation in any business/engineering field are inseparable from the computer and network infrastructure that supports the core business. The world has been turning into an era of rapid development of information technology. Every year, there are more individuals and companies that start using cloud storages and other cloud services for computing and information storage. Therefore, the security of sensitive information in cloud becomes a very important challenge that needs to be addressed. The cloud authentication is a special form of authentication for today’s enterprise IT infrastructure. Cloud applications communicate with the LDAP server which could be an on-premises directory server or an identity management service running on cloud. Due to the complex nature of cloud authentication, an effective and fast authentication scheme is required for successful cloud applications. In this study, we designed several cloud authorization schemes to integrate an onpremises or cloud-based directory service with a cloud application. We also discussed the pros and cons of different approaches to illustrate the best practices on this topic.


Author(s):  
Ian Parkman ◽  
Samuel Holloway

While most academic research has considered authenticity from the consumers perspective, this paper proposes and tests a new empirical operationalization of Beverlands (2005) widely cited proposition that firm-side authenticity is…partly true and partly rhetorical (p.1008). Our study presents a model based on the Competitive Advantage (CA) that results from congruence between the partly true aspects of the firms internal culture, resources, and capabilities measured as Innovation Capacity (IC), alongside Corporate Identity Management (CIM) as the organizations partly rhetorical outwardly-directed corporate branding and marketing promotions activities. Our findings are interpreted through a four-quadrant Rosetta Stone framework for evaluating firm-side authenticity across organizational contexts and environments describing how high-IC/high-CIM (i.e., Authentic) firms create differentiation from low-IC/low-CIM Inauthentic organizations and low-IC/high-CIM Faux Imitators competitors who attempt to compensate for their lack of IC through increased investments in CIM.


2020 ◽  
Author(s):  
Cátia Santos-Pereira

BACKGROUND GDPR was scheduled to be formally adopted in 2016 with EU member states being given two years to implement it (May 2018). Given the sensitive nature of the personal data that healthcare organization process on a 24/7 basis, it is critical that the protection of that data in a hospital environment is given the high priority that data protection legislation (GDPR) requires. OBJECTIVE This study addresses the state of Public Portuguese hospitals regarding GDPR compliance in the moment of GDPR preparation period (2016-2018) before the enforcement in 25 May 2018, and what activities have started since then. The study focuses in three GDPR articles namely 5, 25 and 32, concerning authentication security, identity management processes and audit trail themes. METHODS The study was conducted between 2017 and 2019 in five Portuguese Public Hospitals (each different in complexity). In each hospital, six categories of information systems critical to health institutions were included in the study, trying to cover the main health information systems available and common to hospitals (ADT, EPR, PMS, RIS, LIS and DSS). It was conducted interviews in two phases (before and after GDPR enforcement) with the objective to identify the maturity of information systems of each hospital regarding authentication security, identity management processes and traceability and efforts in progress to avoid security issues. RESULTS A total of 5 hospitals were included in this study and the results of this study highlight the hospitals privacy maturity, in general, the hospitals studied where very far from complying with the security measures selected (before May 2018). Session account lock and password history policy were the poorest issues, and, on the other hand, store encrypted passwords was the best issue. With the enforcement of GDPR these hospitals started a set of initiatives to fill this gap, this is made specifically for means of making the whole process as transparent and trustworthy as possible and trying to avoid the huge fines. CONCLUSIONS We are still very far from having GDPR compliant systems and Institutions efforts are being done. The first step to align an organization with GDPR should be an initial audit of all system. This work collaborates with the initial security audit of the hospitals that belong to this study.


2019 ◽  
Vol 9 (3) ◽  
Author(s):  
Lucy R. Tavitian ◽  
Michael Bender ◽  
Fons J. R. Van de Vijver ◽  
Athanasios Chasiotis ◽  
Hrag A. Vosgerichian

How people deal with adversity, in terms of threats to their social or ethnic identity has been extensively investigated. However, most studies have focused on samples (e.g. minority groups) from prototypical Western contexts. It is unclear how individuals perceive and deal with identity threats within non-Western plural contexts characterized by intergroup conflict. We therefore assess whether self-affirmation by recalling a past success can buffer against identity threat in the plural, non-Western context of Lebanon. In two studies we investigate how threats are negotiated at a national (Lebanon) (Study 1) and ethnic minority (Armenian) level (Study 2). In Study 1, we show that in a context characterized by a history of intergroup conflict, a superordinate national identity is non-salient. When investigating the content of memories of a sectarian group in Study 2, we find a hypersalient and chronically accessible ethnic identity, a pattern specific to Armenian Lebanese. We suggest that this hyper-salience is employed as a spontaneous identity management strategy by a minority group coping with constant continuity threat. Our findings point to the importance of expanding the study of identity processes beyond the typically Western contexts and in turn, situating them within their larger socio-political and historical contexts.


Sign in / Sign up

Export Citation Format

Share Document