[go: up one dir, main page]

Dubey et al., 2020 - Google Patents

Identity and Access Management: IBM Stack Tools

Dubey et al., 2020

View PDF
Document ID
2984747426062315439
Author
Dubey A
Chawla P
Kathuria M
Publication year
Publication venue
Identity

External Links

Snippet

Securing workplace and workstation is the first and the foremost thing we do. Data which is the most valuable asset of any company or individual has to be protected at any cost from internal and external threats. Hence, there is a need for trusted, highly secure and …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies

Similar Documents

Publication Publication Date Title
AU2019206006B2 (en) System and method for biometric protocol standards
Viega Building security requirements with CLASP
US11582244B2 (en) Access control of administrative operations within an application
WO2013035409A1 (en) Cloud computing system
Bajaj et al. Cloud security: the future of data storage
Alouane et al. Security, privacy and trust in cloud computing: A comparative study
Haber et al. Privileged Access Management (PAM)
Henry et al. Cloud Computing Security Threats And Solutions
Purba et al. Assessing Privileged Access Management (PAM) using ISO 27001: 2013 Control
Dubey et al. Identity and Access Management: IBM Stack Tools
Simpson et al. Secure Identity for Enterprises.
JP7361384B2 (en) Electronic application assistance method, electronic application assistance system, electronic application assistance system program and its recording medium
Jensen Identity management lifecycle-exemplifying the need for holistic identity assurance frameworks
Butler Privileged password sharing:“root” of all evil
Small Business and technical motivation for identity management
Gyabi et al. Data Security in Rural Banking Sector: A Case Study in Ashanti Region
Trias et al. Enterprise level security
Veinović Privileged Identities-Threat to Network and Data Security
Tuononen Privileged access management model for a managed service provider
Huawei Technologies Co., Ltd. Database Security Fundamentals
Beshiri Authentication and authorization in service oriented cloud computing architecture
Harris et al. Distributed database security
Kline et al. Security, Privacy, and Compliance with the Law
Fernández Jiménez Implementation of an access control tool for privileged accounts (PRA)
Anand Role of IAM in an Organization