2017 24th International Conference on Telecommunications (ICT) 2017
DOI: 10.1109/ict.2017.7998280
|View full text |Cite
|
Sign up to set email alerts
|

Choice of suitable Identity and Access Management standards for mobile computing and communication

Abstract: Abstract-Enterprises

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
7
1
1

Relationship

7
2

Authors

Journals

citations
Cited by 15 publications
(10 citation statements)
references
References 12 publications
0
10
0
Order By: Relevance
“…It provides various ways to exchange route messages: directly, in fanout form, by topic, and based on headers [3]. For enhancing the security of IoT systems across multiple clouds, these messaging protocols can be combined with identity and access management protocols [24], [25], [26], [27], [28], [29]. Similarly, for the better provisioning of IoT systems, the Docker-based design may be an alternative option for users [30], [31], [32].…”
Section: Reliability/qos Vs Interoperabilitymentioning
confidence: 99%
“…It provides various ways to exchange route messages: directly, in fanout form, by topic, and based on headers [3]. For enhancing the security of IoT systems across multiple clouds, these messaging protocols can be combined with identity and access management protocols [24], [25], [26], [27], [28], [29]. Similarly, for the better provisioning of IoT systems, the Docker-based design may be an alternative option for users [30], [31], [32].…”
Section: Reliability/qos Vs Interoperabilitymentioning
confidence: 99%
“…OAuth was found to be suitable for an authorization only but not for an authentication while OpenID Connect was found to be the best choice [9]. Brent Carrara et.…”
Section: Related Workmentioning
confidence: 98%
“…This federated IDM model solves two major issues: 1) it removes the organisational burden of managing identity and credentials securely by introducing a third-party IDentity Provider (IDP), which is an additional task alongside the main business operations and 2) it removes the burden from users to manage several identity related credentials for several systems by offering a Single-Sign On (SSO) facility [8], [9]. However, this IDM model has a similar issue in that the abundance of identity related personally identifiable information of a user is held by the IDP (see Fig.…”
Section: Federated Identity Management Model (Idm 20)mentioning
confidence: 99%