Affiliation:
1. School of Business Studies, Sharda University, Greater Noida, India
2. Mewar University, Chittorgarh, India
Abstract
This article describes how in today's digital world, customers have made it a common practice to maintain user accounts with different service providers to access a range of services. In such environment, all attributes of the identity must be verified to operate, otherwise the resources would be vulnerable to financial and data loss. This article contends that makes it important to form an Identity Management System, which could provide central administration, user self- service, role based access control and integrated user management. Identity Management becomes very much vital for the environment working with multiple technologies, as it governs an entity (i.e. a human or a software agent) to authenticate and authorize for accessing the network via multiple technologies. Successful Identity Management increases the efficiency, security, access control and decreases the complexity, cost and many repetitive works. Essential features of present day identity management systems have been identified in the present work. A comparative analysis of these identity management systems has been carried out to establish the present-day industry practices. Along with that, specific challenges to the present-day identity management systems have been identified. The article helps in the identification of suitable Identity Management System for specific applications.
Subject
General Earth and Planetary Sciences,General Environmental Science
Reference52 articles.
1. CA.com. (n.d.). Identity management. Retrieved 05.08.2015 from http://www.ca.com/in/identity-management.aspx
2. Chadwick, D. (2009). Federated identity management. In Foundations of security analysis and design V (pp. 96-120).
3. Microsoft Corporation, Architecture Journal.Chonka, A., Xiang, Y., Zhou, W., &Bonti, A. (2011). Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks.;F.Chog;Journal of Network and Computer Applications,2004
4. Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
5. Identity management and its support of multilateral security
Cited by
28 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献