Access Management System

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 145929 Experts worldwide ranked by ideXlab platform

Sara Jeza Alotaibi - One of the best experts on this subject based on the ideXlab platform.

  • towards a framework and model for acceptable user experiences in e government physical and virtual identity Access Management Systems
    2017
    Co-Authors: Sara Jeza Alotaibi
    Abstract:

    The wide spread of services on the internet has aggravated the issue of maintaining multiple identities such as the virtual identities that are based on specific login credentials like username, passwords and PINs. On the other hand, multiple physical identities also prove to be difficult to maintain since different sources require the presence of different smart cards, mobile devices or other proofs of identity. Therefore, the modern world is populated with so many virtual and physical Identity Access Management Systems (IAMS) that individuals are required to maintain multiple passwords and login credentials. The tedious task of remembering these can be minimised through the utilisation of an innovative approach of single sign-in mechanisms. During recent times, several Systems have been developed to provide physical and virtual IAMS; however, most have not been very successful according to specific criteria. Furthermore, alongside increasing the level of awareness for the need to deploy interoperable physical and virtual IAMS, there exists an immediate need for the establishment of clear guidelines for the successful integration of the two media. The importance of and motivation for the integration of the two media will be discussed in this thesis with respect to three perspectives: security, which includes identity; user experience, comprising usability; and acceptability, containing Accessibility. Not many frameworks and models abide by all guidelines for all of these perspectives; thus, the thesis addresses the immediate need to establish a framework and a model for acceptable user experience for successful integration of the two media for public services within the e-government domain. The IAMS framework is based on the attributes from the researched theories of the three perspectives and expert evaluations of the unique nine themes. Regarding the users evaluation to test the proposed Unified Theory of Acceptance and Use of Technology Model(UTAUT), there is an indirect effect on behavioural intentions to use a new prototype System (Ubiquitous Identity Access Management System "UbIAMS") through performance expectancy, effort expectancy, social influence, and through items pertaining to acceptability and user experience.

  • evaluation of the utaut model for acceptable user experiences in e government physical and virtual identity Access Management Systems
    2013
    Co-Authors: Sara Jeza Alotaibi, Mike Wald
    Abstract:

    The modern world is populated with a great many physical and virtual IAMS (Identity Access Management Systems), where people need to maintain various login credentials. There is a key issue associated with this approach, which is the ability to remember this information; however, this can be circumvented to some degree through utilising an innovative approach of a single sign-in mechanism. Throughout the course of recent times, a number of different Systems have been developed in order to deliver both virtual and physical IAMS. Moreover, in addition to a greater level of awareness to ensure interoperable virtual and physical IAMS are implemented, there is a pressing urgency for clear guidelines to be devised relating to the integration of: security, comprising identity; user experience, involving usability; and acceptability, encompassing Accessibility. Very few models adhere to such guidelines; therefore, this paper seeks to deal with the pressing need to devise, implement and evaluate a model for acceptable user experience, enabling the successful integration of physical and virtual public services in an e-government context. In regard to the users’ assessment, which tests the suggested Unified Theory of Acceptance and Use of Technology (UTAUT), it was observed that there is an indirect impact on behavioural intention to utilise a new prototype System (Ubiquitous Identity Access Management System ”UbIAMS” ) through various factors, namely effort expectancy, performance expectancy and social influence, as well as through items relating to acceptability and user experience

  • Evaluation of the UTAUT model for acceptable user experiences in Identity Access Management Systems
    8th International Conference for Internet Technology and Secured Transactions (ICITST-2013), 2013
    Co-Authors: Sara Jeza Alotaibi, Mike Wald
    Abstract:

    The modern world is populated with a great many physical and virtual lAMS (Identity Access Management Systems), where people need to maintain various login credentials. There is a key issue associated with this approach, which is the ability to remember this information; however, this can be circumvented to some degree through utilising an innovative approach of a single sign-in mechanism. Throughout the course of recent times, a number of different Systems have been developed in order to deliver both virtual and physical lAMS. Moreover, in addition to a greater level of awareness to ensure interoperable virtual and physical lAMS are implemented, there is a pressing urgency for clear guidelines to be devised relating to the integration of: security, comprising identity; user experience, involving usability; and acceptability, encompassing Accessibility. Very few models adhere to such guidelines; therefore, this paper seeks to deal with the pressing need to devise, implement and evaluate a model for acceptable user experience, enabling the successful integration of physical and virtual public services in an e-government context. In regard to the users' assessment, which tests the suggested Unified Theory of Acceptance and Use of Technology (UTAUT), it was observed that there is an indirect impact on behavioural intention to utilise a new prototype System (Ubiquitous Identity Access Management System "UbIAMS" ) through various factors, namely effort expectancy, performance expectancy and social influence, as well as through items relating to acceptability and user experience.

  • towards a utaut based model for studying the integrating physical and virtual identity Access Management Systems in e government domain
    International Conference for Internet Technology and Secured Transactions, 2012
    Co-Authors: Sara Jeza Alotaibi, Mike Wald
    Abstract:

    The success of any technology is not only dependent on the number of good reviews or great revenues, but also on the factors that can help one comprehend the level of acceptance that can be expected from any technology. This paper discusses the progress of acceptance theories and models, which have led to the development of an effective model that can be used to calculate the level of predicting, explaining, and understanding individuals' acceptance for a new proposed System, called Ubiquitous Identity Access Management System (UbIAMS), that provides interoperability between the physical and virtual spaces, alongside to three perspectives: Security, which includes identity; User Experience, comprising Usability; and Acceptability, containing Accessibility. Existing research in this area tend to focus on one of these research perspectives. However, there is little evidence that researchers have approached the issue of an overlap and conflict between these three research perspectives with the intent of building a cohesive understanding of integrating physical and virtual Identity Access Management Systems (IAMSs) in e-government domain and the relationships that exist between the different dimensions and components. Consequently, this paper has developed a conceptual Unified Theory of Acceptance and Use of Technology (UTAUT)-based model for integrating physical and virtual IAMSs.

Mike Wald - One of the best experts on this subject based on the ideXlab platform.

  • evaluation of the utaut model for acceptable user experiences in e government physical and virtual identity Access Management Systems
    2013
    Co-Authors: Sara Jeza Alotaibi, Mike Wald
    Abstract:

    The modern world is populated with a great many physical and virtual IAMS (Identity Access Management Systems), where people need to maintain various login credentials. There is a key issue associated with this approach, which is the ability to remember this information; however, this can be circumvented to some degree through utilising an innovative approach of a single sign-in mechanism. Throughout the course of recent times, a number of different Systems have been developed in order to deliver both virtual and physical IAMS. Moreover, in addition to a greater level of awareness to ensure interoperable virtual and physical IAMS are implemented, there is a pressing urgency for clear guidelines to be devised relating to the integration of: security, comprising identity; user experience, involving usability; and acceptability, encompassing Accessibility. Very few models adhere to such guidelines; therefore, this paper seeks to deal with the pressing need to devise, implement and evaluate a model for acceptable user experience, enabling the successful integration of physical and virtual public services in an e-government context. In regard to the users’ assessment, which tests the suggested Unified Theory of Acceptance and Use of Technology (UTAUT), it was observed that there is an indirect impact on behavioural intention to utilise a new prototype System (Ubiquitous Identity Access Management System ”UbIAMS” ) through various factors, namely effort expectancy, performance expectancy and social influence, as well as through items relating to acceptability and user experience

  • Evaluation of the UTAUT model for acceptable user experiences in Identity Access Management Systems
    8th International Conference for Internet Technology and Secured Transactions (ICITST-2013), 2013
    Co-Authors: Sara Jeza Alotaibi, Mike Wald
    Abstract:

    The modern world is populated with a great many physical and virtual lAMS (Identity Access Management Systems), where people need to maintain various login credentials. There is a key issue associated with this approach, which is the ability to remember this information; however, this can be circumvented to some degree through utilising an innovative approach of a single sign-in mechanism. Throughout the course of recent times, a number of different Systems have been developed in order to deliver both virtual and physical lAMS. Moreover, in addition to a greater level of awareness to ensure interoperable virtual and physical lAMS are implemented, there is a pressing urgency for clear guidelines to be devised relating to the integration of: security, comprising identity; user experience, involving usability; and acceptability, encompassing Accessibility. Very few models adhere to such guidelines; therefore, this paper seeks to deal with the pressing need to devise, implement and evaluate a model for acceptable user experience, enabling the successful integration of physical and virtual public services in an e-government context. In regard to the users' assessment, which tests the suggested Unified Theory of Acceptance and Use of Technology (UTAUT), it was observed that there is an indirect impact on behavioural intention to utilise a new prototype System (Ubiquitous Identity Access Management System "UbIAMS" ) through various factors, namely effort expectancy, performance expectancy and social influence, as well as through items relating to acceptability and user experience.

  • towards a utaut based model for studying the integrating physical and virtual identity Access Management Systems in e government domain
    International Conference for Internet Technology and Secured Transactions, 2012
    Co-Authors: Sara Jeza Alotaibi, Mike Wald
    Abstract:

    The success of any technology is not only dependent on the number of good reviews or great revenues, but also on the factors that can help one comprehend the level of acceptance that can be expected from any technology. This paper discusses the progress of acceptance theories and models, which have led to the development of an effective model that can be used to calculate the level of predicting, explaining, and understanding individuals' acceptance for a new proposed System, called Ubiquitous Identity Access Management System (UbIAMS), that provides interoperability between the physical and virtual spaces, alongside to three perspectives: Security, which includes identity; User Experience, comprising Usability; and Acceptability, containing Accessibility. Existing research in this area tend to focus on one of these research perspectives. However, there is little evidence that researchers have approached the issue of an overlap and conflict between these three research perspectives with the intent of building a cohesive understanding of integrating physical and virtual Identity Access Management Systems (IAMSs) in e-government domain and the relationships that exist between the different dimensions and components. Consequently, this paper has developed a conceptual Unified Theory of Acceptance and Use of Technology (UTAUT)-based model for integrating physical and virtual IAMSs.

Rahul Gaikwad - One of the best experts on this subject based on the ideXlab platform.

  • User identity and Access Management trends in IT infrastructure- an overview
    2015 International Conference on Pervasive Computing (ICPC), 2015
    Co-Authors: Manav A. Thakur, Rahul Gaikwad
    Abstract:

    Nowadays, people around the world completely depend and mostly use the Internet to maintain communication, contact with family, friends and with people around the world, Access and exchange information, and enjoy multimedia communication. As the use of internet increase then users those who use internet and Access the information using internet in the organization or outside organization also increase. User Data security is very tedious and important part of IT System and its user lifecycle control System. Because of this the reason user data security is always consider while designing security Systems for an organization. Modern approaches are to maintain the track of users and records of user Access, Identity Management Systems and Access Management Systems are used. Identity Management System help to provide a super-set of user provisioning Systems that provide easy Management of user credentials and their identity information to users and others those who need that information. Similarly Access Management Systems provide strong authentication and authorization solution using SSO, WebSEAL, and policy-based approach to identify who can Access the resource at what level. The new research and approaches provide such a new functions base on organization policies that help to re-engine the Access of user base on security procedures to the resources which are available. This paper provides an overview of the Identity Management Systems Access Management System and Federated Identity Manager that how they are use to manage the user security and also the challenges or risks in implementing a Secure System.

Manav A. Thakur - One of the best experts on this subject based on the ideXlab platform.

  • User identity and Access Management trends in IT infrastructure- an overview
    2015 International Conference on Pervasive Computing (ICPC), 2015
    Co-Authors: Manav A. Thakur, Rahul Gaikwad
    Abstract:

    Nowadays, people around the world completely depend and mostly use the Internet to maintain communication, contact with family, friends and with people around the world, Access and exchange information, and enjoy multimedia communication. As the use of internet increase then users those who use internet and Access the information using internet in the organization or outside organization also increase. User Data security is very tedious and important part of IT System and its user lifecycle control System. Because of this the reason user data security is always consider while designing security Systems for an organization. Modern approaches are to maintain the track of users and records of user Access, Identity Management Systems and Access Management Systems are used. Identity Management System help to provide a super-set of user provisioning Systems that provide easy Management of user credentials and their identity information to users and others those who need that information. Similarly Access Management Systems provide strong authentication and authorization solution using SSO, WebSEAL, and policy-based approach to identify who can Access the resource at what level. The new research and approaches provide such a new functions base on organization policies that help to re-engine the Access of user base on security procedures to the resources which are available. This paper provides an overview of the Identity Management Systems Access Management System and Federated Identity Manager that how they are use to manage the user security and also the challenges or risks in implementing a Secure System.

Benjamin Glasle - One of the best experts on this subject based on the ideXlab platform.

  • de nbi cloud federation through elixir aai
    F1000Research, 2019
    Co-Authors: Peter Belmann, Helena Rasche, Maximilian Hanussek, Felix Bartusch, Jan Krüger, Björn Fischer, Martin Lang, Michal Prochazka, Manuel Prinz, Benjamin Glasle
    Abstract:

    The academic de.NBI Cloud offers compute resources for life science research in Germany.  At the beginning of 2017, de.NBI Cloud started to implement a federated cloud consisting of five compute centers, with the aim of acting as one resource to their users. A federated cloud introduces multiple challenges, such as a central Access and project Management point, a unified account across all cloud sites and an interchangeable project setup across the federation. In order to implement the federation concept, de.NBI Cloud integrated with the ELIXIR authentication and authorization infrastructure System (ELIXIR AAI) and in particular Perun, the identity and Access Management System of ELIXIR. The integration solves the mentioned challenges and represents a backbone, connecting five compute centers which are based on OpenStack and a web portal for Accessing the federation.This article explains the steps taken and software components implemented for setting up a federated cloud based on the collaboration between de.NBI Cloud and ELIXIR AAI. Furthermore, the setup and components that are described are generic and can therefore be used for other upcoming or existing federated OpenStack clouds in Europe.