Yousef K. Sanjalawe, Mohammed Anbar, Qusay M. Al-zoubi
{"title":"身份和访问管理系统的评估","authors":"Yousef K. Sanjalawe, Mohammed Anbar, Qusay M. Al-zoubi","doi":"10.1504/IJITST.2021.10035182","DOIUrl":null,"url":null,"abstract":"One of the most critical issues of all of networks types that integrate the both of wired and wireless technologies is the performance and applicability of the electronic authentication and identification techniques. These schemes involve various technologies of different levels of security. This research presents a comparative study of six IDAM available tools, based on the three characteristics (ease of use, usefulness, and user's satisfaction), which build targets to be achieved in order to gain quality in software. The tools compared in this study are Log Mote, Oracle ID management, Tivoli Identity Manager, NetIQ-Novell, Access Sentinel, and Active Directory. In order to enable users to access the available resources in a secure way, we propose a novel architecture of IDAM. The proposed architecture basically has several advantages like, autonomy, comprehensive and systematic, standardization, and scalability.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2021-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An evaluation of identity and access management systems\",\"authors\":\"Yousef K. Sanjalawe, Mohammed Anbar, Qusay M. Al-zoubi\",\"doi\":\"10.1504/IJITST.2021.10035182\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"One of the most critical issues of all of networks types that integrate the both of wired and wireless technologies is the performance and applicability of the electronic authentication and identification techniques. These schemes involve various technologies of different levels of security. This research presents a comparative study of six IDAM available tools, based on the three characteristics (ease of use, usefulness, and user's satisfaction), which build targets to be achieved in order to gain quality in software. The tools compared in this study are Log Mote, Oracle ID management, Tivoli Identity Manager, NetIQ-Novell, Access Sentinel, and Active Directory. In order to enable users to access the available resources in a secure way, we propose a novel architecture of IDAM. The proposed architecture basically has several advantages like, autonomy, comprehensive and systematic, standardization, and scalability.\",\"PeriodicalId\":38357,\"journal\":{\"name\":\"International Journal of Internet Technology and Secured Transactions\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-01-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Internet Technology and Secured Transactions\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1504/IJITST.2021.10035182\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"Computer Science\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Internet Technology and Secured Transactions","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/IJITST.2021.10035182","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Computer Science","Score":null,"Total":0}
An evaluation of identity and access management systems
One of the most critical issues of all of networks types that integrate the both of wired and wireless technologies is the performance and applicability of the electronic authentication and identification techniques. These schemes involve various technologies of different levels of security. This research presents a comparative study of six IDAM available tools, based on the three characteristics (ease of use, usefulness, and user's satisfaction), which build targets to be achieved in order to gain quality in software. The tools compared in this study are Log Mote, Oracle ID management, Tivoli Identity Manager, NetIQ-Novell, Access Sentinel, and Active Directory. In order to enable users to access the available resources in a secure way, we propose a novel architecture of IDAM. The proposed architecture basically has several advantages like, autonomy, comprehensive and systematic, standardization, and scalability.