Dubey et al., 2020 - Google Patents
Identity and Access Management: IBM Stack ToolsDubey et al., 2020
View PDF- Document ID
- 2984747426062315439
- Author
- Dubey A
- Chawla P
- Kathuria M
- Publication year
- Publication venue
- Identity
External Links
Snippet
Securing workplace and workstation is the first and the foremost thing we do. Data which is the most valuable asset of any company or individual has to be protected at any cost from internal and external threats. Hence, there is a need for trusted, highly secure and …
- 230000005923 long-lasting effect 0 abstract 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| AU2019206006B2 (en) | System and method for biometric protocol standards | |
| Viega | Building security requirements with CLASP | |
| US11582244B2 (en) | Access control of administrative operations within an application | |
| WO2013035409A1 (en) | Cloud computing system | |
| Bajaj et al. | Cloud security: the future of data storage | |
| Alouane et al. | Security, privacy and trust in cloud computing: A comparative study | |
| Haber et al. | Privileged Access Management (PAM) | |
| Henry et al. | Cloud Computing Security Threats And Solutions | |
| Purba et al. | Assessing Privileged Access Management (PAM) using ISO 27001: 2013 Control | |
| Dubey et al. | Identity and Access Management: IBM Stack Tools | |
| Simpson et al. | Secure Identity for Enterprises. | |
| JP7361384B2 (en) | Electronic application assistance method, electronic application assistance system, electronic application assistance system program and its recording medium | |
| Jensen | Identity management lifecycle-exemplifying the need for holistic identity assurance frameworks | |
| Butler | Privileged password sharing:“root” of all evil | |
| Small | Business and technical motivation for identity management | |
| Gyabi et al. | Data Security in Rural Banking Sector: A Case Study in Ashanti Region | |
| Trias et al. | Enterprise level security | |
| Veinović | Privileged Identities-Threat to Network and Data Security | |
| Tuononen | Privileged access management model for a managed service provider | |
| Huawei Technologies Co., Ltd. | Database Security Fundamentals | |
| Beshiri | Authentication and authorization in service oriented cloud computing architecture | |
| Harris et al. | Distributed database security | |
| Kline et al. | Security, Privacy, and Compliance with the Law | |
| Fernández Jiménez | Implementation of an access control tool for privileged accounts (PRA) | |
| Anand | Role of IAM in an Organization |