The Post-Implementation Effects of Aan Identity Management Platform on Risk and Regulatory Compliance

Authors

  • Yeşim Ülgen Sönmez Dept. of Software Engineering, Faculty of Technology, Fırat University https://orcid.org/0000-0002-2090-0263
  • Wayne A. Szot Dept. of Computer Science, Sam Houston State University

DOI:

https://doi.org/10.5281/zenodo.8380593

Keywords:

Audit, Identity Management, RBAC (Role Based Identity Management) Risk, SOX

Abstract

Why should a company focus on Identity Management? The risks of not doing so are great and many compa-nies do not realize the amount of benefit that can be achieved from doing do. This study attempts to quantity and measure how much benefit can be had by committing to a proper Identity Management platform and solu-tion to give confidence and arm the Information Security department with data to present when it comes time for funding decisions.

References

Alese, T. Owolafe, O. Thompson, A. F. & Alese, B. K. (2021), A User Identity Management System for

Cybercrime Control, Nigerian Journal of Technology, 40: (1), 129–139, doi: 10.4314/njt.v40i1.17.

Athamena, B. & Houhamdi, Z. (2020), Identity Management System Model in the Internet of Things, TEM

Journal, 1338–1347, doi: 10.18421/tem94-04.

Dólera Tormo, G. López Millán, G. & Martínez Pérez, G. (2012), Definition of an advanced identity

management infrastructure, International Journal of Information Security, 12: (3), 173–200,

doi:10.1007/s10207-012-0189-y.

Farid, F. Elkhodr, M. Sabrina, F. Ahamed, F.& Gide, E. (2021), A Smart Biometric Identity Management

Framework for Personalised IoT and Cloud Computing-Based Healthcare Services, Sensors, 21: (2), 552,

doi: 10.3390/s21020552.

Gaedke, M. Meinecke, J. & Nussbaumer, M. (2005), A Modeling Approach to Federated Identity and Access

Management, ACM, 1–59593051-5/05/0005, 1156–1157.

Lynch, L. (2011), Inside the Identity Management Game, IEEE Internet Computing, 15: (5), 78–82, doi:

1109/mic.2011.119.

Nuñez, D. & Agudo, I. (2014), BlindIdM: A privacy-preserving approach for identity management as a service, International Journal of Information Security, 13: (2), 199–215, doi: 10.1007/s10207-014-0230-4.

Sobh, T. S. (2019), Identity management using SAML for mobile clients and Internet of Things, Journal of

High Speed Networks, 25:(1), 101–126, doi: 10.3233/jhs-190606.

Vaidya, J. Atluri, V. Guo, Q. & Adam, N. (2008) Migrating to optimal RBAC with minimal perturbation,

Proceedings of the 13th ACM Symposium on Access Control Models and Technologies - SACMAT 08.

doi:10.1145/1377836.1377839.

Veeningen, M. Weger, B. & Zannone, N. (2014), Data minimisation in communication protocols: a formal

analysis framework and application to identity management, International Journal of Information Security,

: (6), 529–569, doi: 10.1007/s10207-014-0235-z.

Published

2023-10-04

How to Cite

Ülgen Sönmez, Y., & Szot , W. A. (2023). The Post-Implementation Effects of Aan Identity Management Platform on Risk and Regulatory Compliance. International Journal of Sustainability, 1(2), 289–301. https://doi.org/10.5281/zenodo.8380593

Issue

Section

Articles