Selecting and Implementing Identity and Access Management Technologies

Author(s):  
Peter Haag ◽  
Marco Spruit

This chapter investigates how organizations can be supported in selecting and implementing Identity and Access Management (IAM) services. Due to the ever growing number of applications that are being used in organizations, stricter regulations and changing relationships between organizations, a new approach towards login- and password administration, security, and compliance is needed. IAM services claim to provide this new approach. Unfortunately, IAM selection projects have not been very successful in the recent past. Therefore, this chapter presents the IAM Services Assessment Model which provides a useful and usable tool to support organizations in the selection and implementation of IAM services.

2021 ◽  
Author(s):  
Fathima T ◽  
Vennila S M

IEEE 802 is used in LAN networks that expose or provide sensitive data to complex applications or services. These are protocols for accessing, managing and controlling access to network-based services and applications in general. Port-controlled network access controls network access and prevents the transmission and reception of nameless or unauthorized persons, leading to network interruption, service theft and data loss. This paper introduces a new approach to investigate whether a data packets in wired networks transferred to a management device is authenticated packet. The data packets are sent to the SDN from RAR and share the information associated with each packet with a limited rate for the access management and are received by the RFC. Here it detects whether the data packet arrived is accepted or restricted. The speed at the authentication start packet is restricted to manage the number of terminals that enter later authentication, and it avoids avalanche impact of wireless authentication which may cause faults to lots of terminals which enter later authentication at the same time.


2019 ◽  
Vol 25 (4) ◽  
pp. 738-756
Author(s):  
Tingting Huang ◽  
Akinori Yokota

Purpose The purpose of this paper is to present a new approach for assessing the status of alignment between organizations and enterprise resource planning (ERP) systems—more friendly and quantitatively. Design/methodology/approach An issue-based ERP assessment model is invented based on thorough literature review and empirical data from three Japanese companies. A modified Cartesian coordinate system is adopted to link the alignment criteria and the system maintenance activities. Findings The findings prove the feasibility of the model and reveal the variation of ERP alignment in a visualized way. It is also indicated that the utilization of the issue-based ERP assessment model is a more convenient method to help the organizations to pinpoint the status of the ERP alignment. Originality/value This is the first approach to measuring the business–information technology alignment visually. One major implication of this research is to provide an easy assessment method which may encourage organizations to do evaluations regularly. The information accumulated by regular assessment can further pinpoint the perfect time to make decisions and provide essential evidence for decision makings, such as when to expand or retire the current system. From the academic perspective, this model provides a new approach to evaluating the assimilation of organizations and ERP systems.


Author(s):  
Kyung Min Kim ◽  
Mitsuru Saito ◽  
Grant G. Schultz ◽  
Dennis L. Eggett

In a traditional safety impact analysis, it is necessary to have crash data on existing roadway conditions and a few years must pass before accumulating additional crash data to evaluate the safety impact of an improvement. This is a time-consuming approach and there remains uncertainty in the crash data integrity. The surrogate safety assessment model (SSAM) was developed for resolving these issues. With SSAM, a conflict analysis is performed in a simulated environment. A planned improvement alternative is modeled and no physical installation of the alternative is needed. This study evaluated if SSAM can be used to assess the safety of a highway segment in terms of the number and type of conflicts and to compare the safety effects of multiple access management alternatives. An evaluation of the effect of converting a two-way left-turn lane (TWLTL) into a raised median on a section of an urban street was performed using SSAM working on VISSIM simulation’s trajectory files. The analysis showed that a raised median would be much safer than a TWLTL median for the same level of traffic volume, with approximately 32 to 50 percent reduction in the number of crossing conflicts. The analysis showed that about 34,000 to 38,000 veh/day would be the demand level where the median conversion is recommended for the four-lane study section. The study concluded that the combination of a simulation software program with SSAM could be a viable surrogate analysis approach for evaluating and comparing the safety effects of multiple access management alternatives.


2012 ◽  
Vol 236-237 ◽  
pp. 627-631
Author(s):  
Peng Fei Xue ◽  
Da Ling Mao

A grey relative degree assessment model for durability of concrete structure, based on the combinatorial weight, in which expert experience & information entropy are taken into account, is established after analyzing problems in existing durability assessment theory. Both the influence of subjective factors and the significance of objective factors are considered in this model, and to avoid assessment deviation for emphasizing one side or another. The model, which is testified by practical engineering example, provides a new approach to make durability assessment more scientifically and exactly.


2014 ◽  
Vol 580-583 ◽  
pp. 2635-2641
Author(s):  
Ling Zhang ◽  
Qiang Liu ◽  
Shuo Yang

A new approach to risk assessment of storm surge and prediction problems was suggested. The model is based on the Extended Kalman Filter (EKF) equations, which simply linearises all nonlinear models so that the traditional Kalman filter can be applied. Key factors describing storm surge disasters are considered in the model. Numerical simulations were carried out and tested with some actual observations of recent storm surge events and related damages in coastal regions of China. The results show a reasonable fit for storm surge disaster prediction and encourage the possibility of using the method for future studies.


2003 ◽  
Vol 18 (13) ◽  
pp. 2367-2377
Author(s):  
BHASKAR DE ◽  
S. BHATTACHARYYA ◽  
P. GUPTAROY

The RHIC measurements on the transverse momentum spectra of the main category of secondary particles produced in the Au + Au collisions were reported in the recent past. The combination of the phenomenological approaches we adopted provide a satisfactory, alternative framework for understanding and explaining the latest data-spurts on charged pions, kaons and the protons–antiprotons. The comparison of the performances by the contesting models on a select kind of secondary (π+) which belongs to the most abundant variety has also been made. The impact and implications of all these have also been spelt out in the end.


Author(s):  
Siu-Tsen Shen ◽  
Stephen D. Prior

With roughly a third of the world’s population now having access to the internet, the area of web efficiency and its optimal use is of growing importance to all online users. We are approaching a tipping point where the majority of people will have spent more time online than offline. With this in mind, the function of revisitation, where a user wants to return to a website that they have visited in the recent past, becomes more important. Current static, textual-list approaches developed within the latest versions of mainstream web browsers such as Internet Explorer, Firefox, and Chrome leave much to be desired. This chapter suggests a new approach via the use of organic, visual, and contextual cues to support users in this vital task area.


1999 ◽  
Vol 173 ◽  
pp. 185-188
Author(s):  
Gy. Szabó ◽  
K. Sárneczky ◽  
L.L. Kiss

AbstractA widely used tool in studying quasi-monoperiodic processes is the O–C diagram. This paper deals with the application of this diagram in minor planet studies. The main difference between our approach and the classical O–C diagram is that we transform the epoch (=time) dependence into the geocentric longitude domain. We outline a rotation modelling using this modified O–C and illustrate the abilities with detailed error analysis. The primary assumption, that the monotonity and the shape of this diagram is (almost) independent of the geometry of the asteroids is discussed and tested. The monotonity enables an unambiguous distinction between the prograde and retrograde rotation, thus the four-fold (or in some cases the two-fold) ambiguities can be avoided. This turned out to be the main advantage of the O–C examination. As an extension to the theoretical work, we present some preliminary results on 1727 Mette based on new CCD observations.


Sign in / Sign up

Export Citation Format

Share Document