Figure 1 - uploaded by Uche Mbanaso
Content may be subject to copyright.
Actors in Federated Access Management

Actors in Federated Access Management

Source publication
Article
Full-text available
Privacy has continued to raise questions wherever personally identifying information (PII) is collected, stored, or used for various purposes. One such environment that privacy has become an issue is access control realm whereby personal attributes are used as the basis to granting access to resources. In a nutshell, PII are usually collected and c...

Context in source publication

Context 1
... web service provisioning introduces a far more extensive and dynamic environment for complex transactions that makes brokered trust insufficient to protect the privacy and confidentiality of all transactions. Figure 1 depicts the multiple actors in federated access management. Service clients can have multiple identities issued by autonomous identity providers, and the identity providers can broker trust among many clients and providers. ...

Similar publications

Preprint
Role-based access control (RBAC) policies represent the rights of subjects in terms of roles to access resources. This research proposes a scalable, flexible and auditable RBAC system using the EOS blockchain platform to meet the security requirements of organizations. The EOS blockchain platform for developing smart contract and decentralized appl...

Citations

... Access control is used on systems or applications that are restricted to certain people. The access control consist of some attribute, information credentials, properties or privileges that may identify an entity in order to determine the access privileges of the system or entity (Mbanaso & Cooper, 2018). Access control include; authentication, authorization. ...
... Access control include; authentication, authorization. Mbanaso and Cooper (2018) posit that authentication addresses the concept of proving and confirming an identity claim by an entity. On a similar note, Singh and Manimegalai (2015), also stated that authentication "is the act of confirming the reality of an aspect of an entity". ...
... The authentication methods include; password, smart card and biometrics, all types of authentication mechanisms allows user to get access to the system however they all work differently. Mbanaso and Cooper (2018), suggested that authorization is "the process of assigning privileges or credentials and the determination of whether the capabilities, privileges or credentials of an authenticated system are sufficient to perform certain actions or functions on a system". Authorization can also be seen as the process by which a system decides if the user has permission to use the system or access the system. ...
Article
Full-text available
The purpose of this paper was to provide understanding about the strategic use of information privacy for organizational sustainability and also examine the relationship between information privacy and organizational sustainability. The baseline theory for this study was the restricted access and limited control theory (RALC), while the method used was the secondary methods where literatures were reviewed. The study findings revealed that, the strategic use of information privacy is vital for organizational sustainability as it protect individual's personal information from malicious users and boosts the confidence and trust the customers have for the organization. The study also found that administrative control and technical control have huge impact on building information privacy protection to achieve organizations sustainability that was measured by corporate reputation and stakeholder's satisfaction. The study concluded that there is a significant relationship between information privacy and organizational sustainability as well as the dimensions to the measures of the study. Based on the findings and conclusion, the study suggested that organizations and business firms should adopt strong administrative control and technical control as their strategies of ensuring information privacy protection in organization as it positively influence organizational sustainability, which can enable them achieved corporate reputation and stakeholder satisfaction.