The Post-Implementation Effects of Aan Identity Management Platform on Risk and Regulatory Compliance
DOI:
https://doi.org/10.5281/zenodo.8380593Keywords:
Audit, Identity Management, RBAC (Role Based Identity Management) Risk, SOXAbstract
Why should a company focus on Identity Management? The risks of not doing so are great and many compa-nies do not realize the amount of benefit that can be achieved from doing do. This study attempts to quantity and measure how much benefit can be had by committing to a proper Identity Management platform and solu-tion to give confidence and arm the Information Security department with data to present when it comes time for funding decisions.
References
Alese, T. Owolafe, O. Thompson, A. F. & Alese, B. K. (2021), A User Identity Management System for
Cybercrime Control, Nigerian Journal of Technology, 40: (1), 129–139, doi: 10.4314/njt.v40i1.17.
Athamena, B. & Houhamdi, Z. (2020), Identity Management System Model in the Internet of Things, TEM
Journal, 1338–1347, doi: 10.18421/tem94-04.
Dólera Tormo, G. López Millán, G. & Martínez Pérez, G. (2012), Definition of an advanced identity
management infrastructure, International Journal of Information Security, 12: (3), 173–200,
doi:10.1007/s10207-012-0189-y.
Farid, F. Elkhodr, M. Sabrina, F. Ahamed, F.& Gide, E. (2021), A Smart Biometric Identity Management
Framework for Personalised IoT and Cloud Computing-Based Healthcare Services, Sensors, 21: (2), 552,
doi: 10.3390/s21020552.
Gaedke, M. Meinecke, J. & Nussbaumer, M. (2005), A Modeling Approach to Federated Identity and Access
Management, ACM, 1–59593051-5/05/0005, 1156–1157.
Lynch, L. (2011), Inside the Identity Management Game, IEEE Internet Computing, 15: (5), 78–82, doi:
1109/mic.2011.119.
Nuñez, D. & Agudo, I. (2014), BlindIdM: A privacy-preserving approach for identity management as a service, International Journal of Information Security, 13: (2), 199–215, doi: 10.1007/s10207-014-0230-4.
Sobh, T. S. (2019), Identity management using SAML for mobile clients and Internet of Things, Journal of
High Speed Networks, 25:(1), 101–126, doi: 10.3233/jhs-190606.
Vaidya, J. Atluri, V. Guo, Q. & Adam, N. (2008) Migrating to optimal RBAC with minimal perturbation,
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies - SACMAT 08.
doi:10.1145/1377836.1377839.
Veeningen, M. Weger, B. & Zannone, N. (2014), Data minimisation in communication protocols: a formal
analysis framework and application to identity management, International Journal of Information Security,
: (6), 529–569, doi: 10.1007/s10207-014-0235-z.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 International Journal of Sustainability
This work is licensed under a Creative Commons Attribution 4.0 International License.