The Roles of Contemporary Identity and Access Management Standards

This chapter covers some of the core concept and technological background of IAM with topics such as, definitions of Identity, Identity Management, and different generations of IAM technologies. However, please take note that this chapter will not be providing in depth explanations of each topic because it is beyond the scope of this book.

2010 ◽  
pp. 52-61
Author(s):  
Evren Eren ◽  
Kai-Oliver Detken

This paper considers some of the identity and access management mechanisms, and adds to this the new requirements posed by identity management in mobile ubiquitous environments. The authors present the state-of-the-art in identity management standards and initiatives in the context of the SIMOIT project and the TNC@FHH implementation. Furthermore, the paper discusses the results achieved by these projects with respect to the generic requirements in different scenarios and compares the achievements.


2021 ◽  
Vol 11 (9) ◽  
pp. 4011
Author(s):  
Dan Wang ◽  
Jindong Zhao ◽  
Chunxiao Mu

In the field of modern bidding, electronic bidding leads a new trend of development, convenience and efficiency and other significant advantages effectively promote the reform and innovation of China’s bidding field. Nowadays, most systems require a strong and trusted third party to guarantee the integrity and security of the system. However, with the development of blockchain technology and the rise of privacy protection, researchers has begun to emphasize the core concept of decentralization. This paper introduces a decentralized electronic bidding system based on blockchain and smart contract. The system uses blockchain to replace the traditional database and uses chaincode to process business logic. In data interaction, encryption techniques such as zero-knowledge proof based on graph isomorphism are used to improve privacy protection, which improves the anonymity of participants, the privacy of data transmission, and the traceability and verifiable of data. Compared with other electronic bidding systems, this system is more secure and efficient, and has the nature of anonymous operation, which fully protects the privacy information in the bidding process.


Electronics ◽  
2021 ◽  
Vol 10 (15) ◽  
pp. 1819
Author(s):  
Rasa Bruzgiene ◽  
Konstantinas Jurgilas

Information systems of critical infrastructure provide services on which the core functions of a state and its economy depend as well as welfare of society. Such systems are becoming an increasingly common target for crimes and attacks in cyberspace, as their vulnerabilities can be exploited for malicious activities seeking financial or political gain. One of the main reasons that threatens the security of these systems is the weak control of remote access, otherwise defined as management of a system’s user identity. Management of user identity depends on user authentication, authorization and the assignment of certain rights in the digital space. This paper provides the proposed two-factor (2FA) digital authentication method for remote access to an information system of a critical infrastructure. Results of testing the method’s usability and resilience to cyber threats have shown that the system, in which the method was implemented, is protected from dangerous HTTP requests and publicly available system’s endpoints are protected from threatening inputs that could cause malicious activities on the critical infrastructure. Additionally, the implementation of the authentication API application ensures the rapidity of the method for less than 500 ms for 100 users working in parallel with the system at the same time.


2016 ◽  
Vol 34 (4) ◽  
pp. 280-289 ◽  
Author(s):  
Ellen T Crumley

Background Internationally, physicians are integrating medical acupuncture into their practice. Although there are some informative surveys and reviews, there are few international, exploratory studies detailing how physicians have accommodated medical acupuncture (eg, by modifying schedules, space and processes). Objective To examine how physicians integrate medical acupuncture into their practice. Methods Semi-structured interviews and participant observations of physicians practising medical acupuncture were conducted using convenience and snowball sampling. Data were analysed in NVivo and themes were developed. Despite variation, three principal models were developed to summarise the different ways that physicians integrated medical acupuncture into their practice, using the core concept of ‘helping’. Quotes were used to illustrate each model and its corresponding themes. Results There were 25 participants from 11 countries: 21 agreed to be interviewed and four engaged in participant observations. Seventy-two per cent were general practitioners. The three models were: (1) appointments (44%); (2) clinics (44%); and (3) full-time practice (24%). Some physicians held both appointments and regular clinics (models 1 and 2). Most full-time physicians initially tried appointments and/or clinics. Some physicians charged to offset administration costs or compensate for their time. Discussion Despite variation within each category, the three models encapsulated how physicians described their integration of medical acupuncture. Physicians varied in how often they administered medical acupuncture and the amount of time they spent with patients. Although 24% of physicians surveyed administered medical acupuncture full-time, most practised it part-time. Each individual physician incorporated medical acupuncture in the way that worked best for their practice.


Author(s):  
Michael H. Herzog ◽  
Gregory Francis ◽  
Aaron Clarke
Keyword(s):  

2021 ◽  
Vol 8 (1) ◽  
pp. 252-266
Author(s):  
Ahmet Koşar ◽  
Aytul Kasapoglu

More than 95 percent of those who lost their lives as a result of the spread of the Covid-19 virus to the world since the beginning of 2020 are over the age of 60 (WHO, 2020). The main purpose of this article is to reveal the vital difficulties of the 65-75 age group in Turkey, who were quarantined due to the Covid-19 pandemic, as a result of deprivation of their former normal lives and how they overcame them. The theoretical starting point of this study is the relational sociologist H. White and his “uncertainty” classification. In the study, Grounded Theory Methodology was chosen as one of the qualitative research approaches and open, axial and selective codings were made as a requirement of this. In this context, interviews were made with 12 individuals from the 65-75 age group and the data were presented in figures. As a result of open, axial and selective coding, the core concept of the study was determined as "solidarity". In accordance with the grounded theory, at the end of the study, the "solidarity process" was narrated using the "river" metaphor.


This chapter presents a few scenarios to demonstrate the fact that identity management is employed in many aspects of our daily activities and gives a brief history of Identity and Access Management, showing our readers how the Internet has prompted identity problems. The author will discuss some of the challenges exemplified by some scenarios such as passwords, biometrics, social identity, and identity mobility.


Author(s):  
Greg Gogolin

This chapter looks at security and privacy concerns of virtual worlds by investigating the use and capabilities of current and emerging technologies such as gaming, blogging, podcasting, virtual meetings, and virtual worlds. Security and privacy concerns will be investigated in the context of exploits and IT-related security risks, access management and confidentiality, reputation and product risk management, resource management, financial considerations and accountability, and safety. Several technologies and personal practices are reviewed, as well as ways to mitigate or eliminate their associated risks. The core principles of information security -confidentiality, integrity, and availability - provide an overall framework for the chapter.


2014 ◽  
Vol 1 (1) ◽  
pp. 21-34 ◽  
Author(s):  
Steen Leleur

This article reviews the generic meaning of ‘system’ and complements more conventional system notions with a system perception based on recent complexity theory. With system as the core concept of systems theory, its actual meaning is not just of theoretical interest but is highly relevant also for systems practice. It is argued that complexity theory and thinking with reference to Luhmann a.o. ought to be recognised and paid attention to by the systems community. Overall, it is found that a complexity orientation may contribute to extend and enrich the explanatory power of current systems theory when used to complex real-world problems. As regards systems practice it is found that selective use and combination of five presented research approaches (functionalist, interpretive, emancipatory, postmodern and complexity) which function as different but complementing ‘epistemic lenses’ in a process described as constructive circularity, may strengthen the exploration and learning efforts in systems-based intervention.


2012 ◽  
Vol 25 (1) ◽  
pp. 159-175
Author(s):  
Mark Thornton

The authors of Crime and Culpability hold a subjectivist theory of criminal culpability according to which the core concept in culpability is subjective recklessness, negligence is not culpable, and it is irrelevant to culpability whether or not a criminal act results in harm. I argue against these three theses and criticize the authors’ views on the structure of criminal law, criminal defences, criminal attempts, and codification.


Sign in / Sign up

Export Citation Format

Share Document