Farroha and Farroha, 2012

Type

Article

Title

Architecting dynamic privileges in protected systems through hardening Identity and Access Management

Authors

Farroha, B., Farroha, D.

Year

2012

Harvard

Farroha, B., Farroha, D., 2012. Architecting dynamic privileges in protected systems through hardening Identity and Access Management. IEEE, pp. 1–6. https://doi.org/10.1109/SysCon.2012.6189527

IDs

Abstract

Information sharing is a fundamental enabler in facilitating better business and security practices, where exchange of information automated. The goal is to design smart systems that monitor and control authorized data to propagate through between security domains to authenticated and authorized users, while removing unauthorized blocks as required by policy. The Department of Defense (DoD) and Federal Agencies have established an information strategy for their respective communities that implement the national level information sharing strategy. The inclusion of a comprehensive Identity and Access Management (IDAM) capability is a fundamental building block to address these strategies. Given that business and mission environments will transition to the use of virtual environments if only to achieve IT efficiencies, this paper discusses additional advantages inherent in virtual environments.

(Farroha and Farroha, 2012,p. 1)


Follow us on LinkedIn | Discuss on Slack | Support us with Patreon | Sign-up for a free membership.


This wiki is owned by Open Measure, a non-profit association. The original content we publish is licensed under a Creative Commons Attribution 4.0 International License.