期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
IAM Excellence: Exploring Saviynt’s Role in Modern Information Technology
1
作者 Sampath Talluri 《Journal of Information Security》 2024年第1期40-52,共13页
Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution... Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution that is being encouraged to shift towards IAM software and potential drawbacks such as excessive provisioning and implementation issues. The study illuminated excellent practices and emphasized the importance of constant monitoring by using secondary theme analysis and qualitative research as proof. The findings indicate Saviynt as a viable solution and provide detailed information for firms seeking a smooth and secure integration path. 展开更多
关键词 Information Technology (IT) Identity and Access Management (IAM) Saviynt User Identities Access Privileges authentication processes Risk Management
下载PDF
Saviynt Meets GCP: A Deep Dive into Integrated IAM for Modern Cloud Security
2
作者 Sampath Talluri 《Journal of Information Security》 2024年第1期1-14,共14页
The Google Cloud Platform (GCP) is a popular choice for companies seeking a comprehensive cloud computing solution because it provides everything from essential computing resources to powerful data analytics and machi... The Google Cloud Platform (GCP) is a popular choice for companies seeking a comprehensive cloud computing solution because it provides everything from essential computing resources to powerful data analytics and machine learning capabilities. Saviynt is a cloud-based Identity and Access Management (IAM) system that integrates with Google Cloud Platform (GCP) and other services for additional functionality. However, other problems are associated with the transition, such as the requirement to correctly integrate IAM Saviynt into current IT infrastructures and provide comprehensive training to users on the new system. The paper will give a detailed review of the advantages, disadvantages, and best practices related to this transition. 展开更多
关键词 Google Cloud Platform (GCP) Identity and Access Management (IAM) Saviynt User Identities Access Privileges authentication processes
下载PDF
IoT Devices Authentication Using Artificial Neural Network
3
作者 Syed Shabih Ul Hasan Anwar Ghani +2 位作者 Ikram Ud Din Ahmad Almogren Ayman Altameem 《Computers, Materials & Continua》 SCIE EI 2022年第2期3701-3716,共16页
User authentication is one of the critical concerns of information security.Users tend to use strong textual passwords,but remembering complex passwords is hard as they often write it on a piece of paper or save it in... User authentication is one of the critical concerns of information security.Users tend to use strong textual passwords,but remembering complex passwords is hard as they often write it on a piece of paper or save it in their mobile phones.Textual passwords are slightly unprotected and are easily attackable.The attacks include dictionary,shoulder surfing,and brute force.Graphical passwords overcome the shortcomings of textual passwords and are designed to aid memorability and ease of use.This paper proposes a Process-based Pattern Authentication(PPA)system for Internet of Things(IoT)devices that does not require a server to maintain a static password of the login user.The server stores user’s information,which they provide at the time of registration,i.e.,the R-code and the symbol,but the P-code,i.e.,the actual password,will change with every login attempt of users.In this scheme,users may draw a pattern on the basis of calculation from the P-code and Rcode in the PPA pattern,and can authenticate themselves using their touch dynamic behaviors through Artificial Neural Network(ANN).The ANN is trained on touch behaviors of legitimate users reporting superior performance over the existing methods.For experimental purposes,PPA is implemented as a prototype on a computer system to carry out experiments for the evaluation in terms of memorability and usability.The experiments show that the system has an effect of 5.03%of the False Rejection Rate(FRR)and 4.36%of the False Acceptance Rate(FAR),respectively. 展开更多
关键词 Implicit authentication behavioral authentication artificial neural network processed pattern authentication
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部