Explore chapters and articles related to this topic
Federation, Presence, Identity, and Privacy in the Cloud
Published in John W. Rittinghouse, James F. Ransome, Cloud Computing, 2017
John W. Rittinghouse, James F. Ransome
Network identity is a set of attributes which describes an individual in the digital space. Identity management is the business processes and technologies of managing the life cycle of an identity and its relationship to business applications and services. Federated identity management (IdM) refers to standards-based approaches for handling authentication, single sign-on (SSO, a property of access control for multiple related but independent software systems), role-based access control, and session management across diverse organizations, security domains, and application platforms. It is a system that allows individuals to use the same user name, password, or other personal identification to sign on to the networks of more than one entity in order to conduct transactions. Federation is enabled through the use of open industry standards and/or openly published specifications, such that multiple parties can achieve interoperability for common use cases. Typical use cases involve things such as cross-domain, web-based single sign-on, cross-domain user account provisioning, cross-domain entitlement management, and cross-domain user attribute exchange.
Blockchain for Internet of Things I
Published in Naveen Chilamkurti, T. Poongodi, Balamurugan Balusamy, Blockchain, Internet of Things, and Artificial Intelligence, 2021
A. Reyana, S. R. Ramya, T. Krishnaprasath, P. Sivaprakash
Critical components to build effective an identity management system still remain a challenge in terms of trust, privacy, and performance. Accessing control and identity are hand-in-hand. The identity systems in IoT enable proper authorization and are designed for rapid growth of policies. A common problem existing in centralized systems is assigning of access rights, roles, and attributes that will not be suitable while scaling decentralized IoT. However blockchain couldn’t address all these problems. In most cases, service and identity providers require authorized users and performance evaluations be essential to run the identity management system.
Blockchain Architecture, Components and Considerations
Published in Shaun Aghili, The Auditor's Guide to Blockchain Technology, 2023
Aafreen Fathima Altaf Hussain, Temitope Ipentan, Mahakpreet Singh, Grace Moyo Adeyemi
Access control is used to prevent cybercriminals from accessing vulnerable systems. Identity management is used to identify, validate and authorize users to access the resources of an organization. Compared to the hierarchical identity management models, the self-sovereign identity model improves security and trust by allowing users to have control of their identities. Some other identity models are ShoCard, UPort and Sovrin.
Secure and transparent pharmaceutical supply chain using permissioned blockchain network
Published in International Journal of Logistics Research and Applications, 2022
Erukala Suresh Babu, Ilaiah Kavati, Soumya Ranjan Nayak, Uttam Ghosh, Waleed Al Numay
Access and Identity Management (IAM) has become a highly relevant task to build digital trust in cyberspace between the Manufacturer, Wholesaler, Shipper, Supplier, Distributor, Retailer, and Patient. Specifically, Identity Management is defined as the process of managing the digital identity of electronic information associated with an individual/organisation. Access management is mainly concerned with authentication and authorisation for the identification of digital identity systems. Precisely, authentication is the process of verifying a user’s identity and proving that process or action is confirmed. The authorisation is the process of enforcing the permission policy once they are authenticated. The proposed blockchain network acts as the trust infrastructure by authenticating the thousands of users /actors and ensuring trust between actors like Manufacturers, Wholesalers, Shipper, Suppliers, Distributors, Retailers, and Patients’ healthcare organisations. The flow of information and delivery of drugs in the pharmaceutical supply chain is shown in Figure 1, and the transactional flow of drugs is shown in Figure 2. Nevertheless, also validate the user's identity with a high level of security.