scholarly journals Identity and Access Management: High-level Conceptual Framework

2021 ◽  
Vol 11 (4) ◽  
pp. 4885-4897
Author(s):  
Sanket Devlekar ◽  
Vidyavati Ramteke

Information security is shifting from a traditional perimeter-based approach to an identity-based approach where the organization's boundaries are where their digital identities exist. The organization has multiple stakeholders having access to various organization resources. Systems and applications are part of organization resources that help them achieve their business goals. These systems and applications are internally or externally exposed to allow all stakeholders to have seamless access, thus making identity and access management a big challenge. Identity and Access Management (IAM) is a fundamental part of information security. It plays a critical role in keeping the organization's information security posture resilient to cyber attacks. This paper will identify various components of an IAM solution that are essential and should be considered while implementing and assessing the IAM solution and provides a high-level IAM framework that will allow information security professionals to assess the IAM security posture of an organization.

2019 ◽  
Vol 18 (1) ◽  
pp. 78-87 ◽  
Author(s):  
Jian-kai Yang ◽  
Hong-jiang Liu ◽  
Yuanyu Wang ◽  
Chen Li ◽  
Ji-peng Yang ◽  
...  

Background and Objective: Exosomes communicate inter-cellularly and miRNAs play critical roles in this scenario. MiR-214-5p was implicated in multiple tumors with diverse functions uncovered. However, whether miR-214-5p is mechanistically involved in glioblastoma, especially via exosomal pathway, is still elusive. Here we sought to comprehensively address the critical role of exosomal miR-214-5p in glioblastoma (GBM) microenvironment.Methods:The relative expression of miR-214-5p was determined by real-time PCR. Cell viability and migration were measured by MTT and transwell chamber assays, respectively. The secretory cytokines were measured with ELISA kits. The regulatory effect of miR-214-5p on CXCR5 expression was interrogated by luciferase reporter assay. Protein level was analyzed by Western blot.Results:We demonstrated that miR-214-5p was aberrantly overexpressed in GBM and associated with poorer clinical prognosis. High level of miR-214-5p significantly contributed to cell proliferation and migration. GBM-derived exosomal miR-214-5p promoted inflammatory response in primary microglia upon lipopolysaccharide challenge. We further identified CXCR5 as the direct target of miR-214- 5p in this setting.Conclusion:Overexpression of miR-214-5p in GBM modulated the inflammatory response in microglia via exosomal transfer.


2021 ◽  
Vol 22 (9) ◽  
pp. 4961
Author(s):  
Maria Kovalska ◽  
Eva Baranovicova ◽  
Dagmar Kalenska ◽  
Anna Tomascova ◽  
Marian Adamkov ◽  
...  

L-methionine, an essential amino acid, plays a critical role in cell physiology. High intake and/or dysregulation in methionine (Met) metabolism results in accumulation of its intermediate(s) or breakdown products in plasma, including homocysteine (Hcy). High level of Hcy in plasma, hyperhomocysteinemia (hHcy), is considered to be an independent risk factor for cerebrovascular diseases, stroke and dementias. To evoke a mild hHcy in adult male Wistar rats we used an enriched Met diet at a dose of 2 g/kg of animal weight/day in duration of 4 weeks. The study contributes to the exploration of the impact of Met enriched diet inducing mild hHcy on nervous tissue by detecting the histo-morphological, metabolomic and behavioural alterations. We found an altered plasma metabolomic profile, modified spatial and learning memory acquisition as well as remarkable histo-morphological changes such as a decrease in neurons’ vitality, alterations in the morphology of neurons in the selective vulnerable hippocampal CA 1 area of animals treated with Met enriched diet. Results of these approaches suggest that the mild hHcy alters plasma metabolome and behavioural and histo-morphological patterns in rats, likely due to the potential Met induced changes in “methylation index” of hippocampal brain area, which eventually aggravates the noxious effect of high methionine intake.


Computers ◽  
2021 ◽  
Vol 10 (5) ◽  
pp. 63
Author(s):  
Fahd Alhaidari ◽  
Taghreed Zayed Balharith

Recently, there has been significant growth in the popularity of cloud computing systems. One of the main issues in building cloud computing systems is task scheduling. It plays a critical role in achieving high-level performance and outstanding throughput by having the greatest benefit from the resources. Therefore, enhancing task scheduling algorithms will enhance the QoS, thus leading to more sustainability of cloud computing systems. This paper introduces a novel technique called the dynamic round-robin heuristic algorithm (DRRHA) by utilizing the round-robin algorithm and tuning its time quantum in a dynamic manner based on the mean of the time quantum. Moreover, we applied the remaining burst time of the task as a factor to decide the continuity of executing the task during the current round. The experimental results obtained using the CloudSim Plus tool showed that the DRRHA significantly outperformed the competition in terms of the average waiting time, turnaround time, and response time compared with several studied algorithms, including IRRVQ, dynamic time slice round-robin, improved RR, and SRDQ algorithms.


2021 ◽  
Vol 13 (12) ◽  
pp. 6750
Author(s):  
Andreja Mihailović ◽  
Julija Cerović Smolović ◽  
Ivan Radević ◽  
Neli Rašović ◽  
Nikola Martinović

The main idea of this research is to examine how teleworking has affected employee perceptions of organizational efficiency and cybersecurity before and during the COVID-19 pandemic. The research is based on an analytical and empirical approach. The starting point of the research is a critical and comprehensive analysis of the relevant literature regarding the efficiency of organizations due to teleworking, digital information security, and cyber risk management. The quantitative approach is based on designing a structural equation model (SEM) on a sample of 1101 respondents from the category of employees in Montenegro. Within the model, we examine simultaneously the impact of their perceptions on the risks of teleworking, changes in cyber-attacks during teleworking, organizations’ capacity to respond to cyber-attacks, key challenges in achieving an adequate response to cyber-attacks, as well as perceptions of key challenges related to cybersecurity. The empirical aspects of our study involve constructing latent variables that correspond to different elements of employee perception; namely, their perception of organizational efficiency and the extent to which the digital information security of their organizations has been threatened during teleworking during the pandemic.


2015 ◽  
Vol 37 (4) ◽  
pp. 459-474 ◽  
Author(s):  
Samantha Evans

Purpose – The purpose of this paper is to examine the interplay between the role of front line managers (FLMs) and their contribution to the reported gap between intended and actual human resource management (HRM). Design/methodology/approach – The findings draw on case study research using 51 semi-structured interviews with managers across two UK retail organisations between 2012 and 2013. Findings – This paper argues that FLMs are key agents in people management and play a critical role in the gap between intended and actual employee relations (ER) and HRM. The research found that these managers held a high level of responsibility for people management, but experienced a lack of institutional support, monitoring or incentives to implement according to central policy. This provided an opportunity for them to modify or resist intended policy and the tensions inherent in their role were a critical factor in this manipulation of their people management responsibilities. Research limitations/implications – The data were collected from only one industry and two organisations so the conclusions need to be considered within these limitations. Practical implications – Efforts to address the gap between intended and actual ER/HRM within organisations will need to consider the role tensions of both front line and middle managers. Originality/value – This research provides a more nuanced understanding of the interplay between FLMs and the gap between intended and actual HRM within organisations. It addresses the issue of FLMs receiving less attention in the HRM-line management literature and the call to research their role in the translation of policy into practice.


2014 ◽  
Vol 5 (3) ◽  
pp. 49-66
Author(s):  
Marko Hell ◽  
Tea Dragičević

Abstract Background: Organisations nowadays operate in a very dynamic environment, and therefore, their ability of continuously adjusting the strategic plan to the new conditions is a must for achieving their strategic objectives. BSC is a well-known methodology for measuring performances enabling organizations to learn how well they are doing. In this paper, “BSC for IS” will be proposed in order to measure the IS impact on the achievement of organizations’ business goals. Objectives: The objective of this paper is to present the original procedure which is used to enhance the BSC methodology in planning the optimal targets of IS performances value in order to maximize the organization's effectiveness. Methods/Approach: The method used in this paper is the quantitative methodology - linear programming. In the case study, linear programming is used for optimizing organization’s strategic performance. Results: Results are shown on the example of a case study national park. An optimal performance value for the strategic objective has been calculated, as well as an optimal performance value for each DO (derived objective). Results are calculated in Excel, using Solver Add-in. Conclusions: The presentation of methodology through the case study of a national park shows that this methodology, though it requires a high level of formalisation, provides a very transparent performance calculation.


Symmetry ◽  
2020 ◽  
Vol 12 (4) ◽  
pp. 664 ◽  
Author(s):  
Rajeev Kumar ◽  
Abhishek Kumar Pandey ◽  
Abdullah Baz ◽  
Hosam Alhakami ◽  
Wajdi Alhakami ◽  
...  

Growing concern about healthcare information security in the wake of alarmingly rising cyber-attacks is being given symmetrical priority by current researchers and cyber security experts. Intruders are penetrating symmetrical mechanisms of healthcare information security continuously. In the same league, the paper presents an overview on the current situation of healthcare information and presents a layered model of healthcare information management in organizations. The paper also evaluates the various factors that have a key contribution in healthcare information security breaches through a hybrid fuzzy-based symmetrical methodology of AHP-TOPSIS. Furthermore, for assessing the effect of the calculated results, the authors have tested the results on local hospital software of Varanasi. Tested results of the factors are validated through the comparison and sensitivity analysis in this study. Tabulated results of the proposed study propose a symmetrical mechanism as the most conversant technique which can be employed by the experts and researchers for preparing security guidelines and strategies.


2019 ◽  
Vol 45 (1) ◽  
pp. 6-10
Author(s):  
Iman Hadi

Identity and access management (IAM) system usually consist of predefined tasks as an information security system. Themain task is the authentication, since it is responsible for user identity proving for service providers that corporate with (IAM).This paper provides a review on intelligent authentication research applicable to IAM systems. These researches areevaluated according to the proposal of intelligent authentication key factors. Depending on this evaluation it could not be foundresearch implement an authentication that satisfies all these key factors.


Sign in / Sign up

Export Citation Format

Share Document